Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PVUfopbGfc.exe

Overview

General Information

Sample name:PVUfopbGfc.exe
renamed because original name is a hash value
Original sample name:402aacbb8dc07d96733eee2292f709d89d65efbe82d55e0dd4b7764cdde287b5.exe
Analysis ID:1524840
MD5:249ed615e8b43896fffd3cb3755c7a0a
SHA1:1b28a72f6746ad76f7b25ab767ce7b775282fbeb
SHA256:402aacbb8dc07d96733eee2292f709d89d65efbe82d55e0dd4b7764cdde287b5
Tags:AciraConsultingIncexeuser-JAMESWT_MHT
Infos:

Detection

LummaC
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:52
Range:0 - 100

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
LummaC encrypted strings found
Maps a DLL or memory area into another process
Modifies the DNS server
NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Queries sensitive system registry key value via command line tool
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read device registry values (via SetupAPI)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables driver privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries device information via Setup API
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Tap Installer Execution
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

  • System is w10x64
  • PVUfopbGfc.exe (PID: 6472 cmdline: "C:\Users\user\Desktop\PVUfopbGfc.exe" MD5: 249ED615E8B43896FFFD3CB3755C7A0A)
    • PVUfopbGfc.tmp (PID: 6632 cmdline: "C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp" /SL5="$1046E,20382094,735744,C:\Users\user\Desktop\PVUfopbGfc.exe" MD5: 259E3EE4646FC251C3513EEF2683479F)
      • cmd.exe (PID: 2448 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\driver\install_tap.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 3356 cmdline: reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • find.exe (PID: 5580 cmdline: find /i "x86" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
        • cmd.exe (PID: 6276 cmdline: C:\Windows\system32\cmd.exe /c ver MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • tapinstall.exe (PID: 5568 cmdline: tapinstall.exe remove tap0901 MD5: E313336C82EB265542664CC7A360C5FF)
        • tapinstall.exe (PID: 1560 cmdline: tapinstall.exe install OemVista.inf tap0901 MD5: E313336C82EB265542664CC7A360C5FF)
      • cmd.exe (PID: 6640 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\sp\install_sp.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 5596 cmdline: sc stop fastestvpndriver MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 6608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 180 cmdline: reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • find.exe (PID: 5528 cmdline: find /i "x86" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
        • reg.exe (PID: 6512 cmdline: reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • find.exe (PID: 5612 cmdline: find /i "Windows 7" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
        • xcopy.exe (PID: 3224 cmdline: xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\drivers MD5: 39FBFD3AF58238C6F9D4D408C9251FF5)
        • nfregdrv.exe (PID: 3116 cmdline: release\nfregdrv.exe -u fastestvpndriver MD5: 9333F583E2D32A47276DCEC7C2391FD2)
        • nfregdrv.exe (PID: 1020 cmdline: release\nfregdrv.exe fastestvpndriver MD5: 9333F583E2D32A47276DCEC7C2391FD2)
      • sc.exe (PID: 6108 cmdline: "C:\Windows\system32\sc.exe" stop FastestVPNService MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 5380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • FastestVPN.WindowsService.exe (PID: 6276 cmdline: "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --uninstall MD5: 22D4E4267DFE093E5E23C2F3D7741AA4)
        • WerFault.exe (PID: 6696 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 1076 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • sc.exe (PID: 6044 cmdline: "C:\Windows\system32\sc.exe" delete FastestVPNService MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 5008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • FastestVPN.WindowsService.exe (PID: 1272 cmdline: "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --install MD5: 22D4E4267DFE093E5E23C2F3D7741AA4)
      • subinacl.exe (PID: 6824 cmdline: "C:\Program Files\FastestVPN\subinacl.exe" /service FastestVPNService /GRANT=everyone=TO MD5: 4798226EE22C513302EE57D3AA94398B)
        • conhost.exe (PID: 5684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5612 cmdline: "C:\Windows\system32\sc.exe" start FastestVPNService MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ComDebug.exe (PID: 1220 cmdline: "C:\Program Files\FastestVPN\Resources\ComDebug.exe" MD5: 850A43E323656B86AE665D8B4FD71369)
        • netsh.exe (PID: 1240 cmdline: C:\Windows\SysWOW64\netsh.exe MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
          • conhost.exe (PID: 3556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Launcher.exe (PID: 5328 cmdline: C:\Users\user\AppData\Local\Temp\Launcher.exe MD5: F43C6B629BAAAAEE1E7FE095A8821631)
      • FastestVPN.exe (PID: 1976 cmdline: "C:\Program Files\FastestVPN\FastestVPN.exe" MD5: 01CF6EF766C41BB2C99A2CCCDECC69C1)
  • svchost.exe (PID: 5484 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • drvinst.exe (PID: 2860 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\oemvista.inf" "9" "4d14a44ff" "0000000000000160" "WinSta0\Default" "0000000000000158" "208" "c:\program files\fastestvpn\resources\driver\windows10\amd64" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
    • drvinst.exe (PID: 2672 cmdline: DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:3beb73aff103cc24:tap0901.ndi:9.24.2.601:tap0901," "4d14a44ff" "0000000000000180" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
  • svchost.exe (PID: 1048 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 1684 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 5576 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6276 -ip 6276 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • dllhost.exe (PID: 6276 cmdline: C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
  • svchost.exe (PID: 7032 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • FastestVPN.exe (PID: 6020 cmdline: "C:\Program Files\FastestVPN\FastestVPN.exe" -autorun MD5: 01CF6EF766C41BB2C99A2CCCDECC69C1)
    • powershell.exe (PID: 5836 cmdline: "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 1020 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • FastestVPN.WindowsService.exe (PID: 1408 cmdline: "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" MD5: 22D4E4267DFE093E5E23C2F3D7741AA4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["bargainnykwo.shop", "benchillppwo.shop", "scatterdshsadyi.shop", "answerrsdo.shop", "bannngwko.shop", "affecthorsedpo.shop", "bouncedgowp.shop", "radiationnopp.shop", "publicitttyps.shop"], "Build id": "long--try"}
SourceRuleDescriptionAuthorStrings
C:\Program Files\FastestVPN\Resources\is-QOP0D.tmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    C:\Program Files\FastestVPN\Resources\is-QOP0D.tmpINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
    • 0x339057:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    • 0x33db63:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    • 0x3e5f06:$s1: CoGetObject
    SourceRuleDescriptionAuthorStrings
    00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      Process Memory Space: PVUfopbGfc.tmp PID: 6632JoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security

          System Summary

          barindex
          Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp, ProcessId: 6632, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FastestVPN.lnk
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\drivers, CommandLine: xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\drivers, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\xcopy.exe, NewProcessName: C:\Windows\System32\xcopy.exe, OriginalFileName: C:\Windows\System32\xcopy.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\sp\install_sp.bat"", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6640, ParentProcessName: cmd.exe, ProcessCommandLine: xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\drivers, ProcessId: 3224, ProcessName: xcopy.exe
          Source: Process startedAuthor: Daniil Yugoslavskiy, Ian Davis, oscd.community: Data: Command: tapinstall.exe remove tap0901, CommandLine: tapinstall.exe remove tap0901, CommandLine|base64offset|contains: , Image: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe, NewProcessName: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe, OriginalFileName: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\driver\install_tap.bat"", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2448, ParentProcessName: cmd.exe, ProcessCommandLine: tapinstall.exe remove tap0901, ProcessId: 5568, ProcessName: tapinstall.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID, CommandLine: "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID, CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Program Files\FastestVPN\FastestVPN.exe" -autorun, ParentImage: C:\Program Files\FastestVPN\FastestVPN.exe, ParentProcessId: 6020, ParentProcessName: FastestVPN.exe, ProcessCommandLine: "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID, ProcessId: 5836, ProcessName: powershell.exe
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall, ProcessId: 5484, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: netsh.exe.1240.50.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["bargainnykwo.shop", "benchillppwo.shop", "scatterdshsadyi.shop", "answerrsdo.shop", "bannngwko.shop", "affecthorsedpo.shop", "bouncedgowp.shop", "radiationnopp.shop", "publicitttyps.shop"], "Build id": "long--try"}
          Source: C:\Program Files\FastestVPN\Resources\desktop_drop_plugin.dll (copy)ReversingLabs: Detection: 62%
          Source: C:\Program Files\FastestVPN\Resources\is-JF6RJ.tmpReversingLabs: Detection: 62%
          Source: PVUfopbGfc.exeReversingLabs: Detection: 21%
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: benchillppwo.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: publicitttyps.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: answerrsdo.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: radiationnopp.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: affecthorsedpo.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: bargainnykwo.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: bannngwko.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: bouncedgowp.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: scatterdshsadyi.shop
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
          Source: 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString decryptor: jMw1IE--VPN

          Exploits

          barindex
          Source: Yara matchFile source: 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: PVUfopbGfc.tmp PID: 6632, type: MEMORYSTR
          Source: Yara matchFile source: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmp, type: DROPPED

          Compliance

          barindex
          Source: PVUfopbGfc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.Terms of ServiceThis is an agreement between you and FastestVPN.com for virtual private network communications services related services and features. It is NOT a service for the commission of criminal acts. It is an anonymity and privacy service. You agree not to violate any laws of any jurisdiction you are originating from or terminating into.You agree to protect your user id/password and our system from unauthorized use. You are responsible for all actions that occur on our servers where the login uses your user id/password.You agree not to use the system for sending spam port scanning scanning for open proxies or open relays sending opt-in email unsolicited email or any type or version of email sent in large quantities even if the email is ultimately sent off of another server. You agree not to launch any pop-ups from our service. You agree not to attack in any way shape or form any other computer or network while on our service.Actual service coverage speeds locations and quality may vary. The Service will attempt to be available at all times except for limited periods for maintenance and repair. However the Service may be subject to unavailability for a variety of factors beyond our control including emergencies third party service failures transmission equipment or network problems or limitations interference signal strength and may be interrupted refused limited or curtailed. We are not responsible for data messages or pages lost not delivered delayed or misdirected because of interruptions or performance issues with the Service or communications services or networks (e.g. T-1 lines or the Internet). We may impose usage or Service limits suspend Service or block certain kinds of usage in our sole discretion to protect users or the Service. Network speed is an estimate and is no indication of the speed at which your or the Service sends or receives data. Actual network speed will vary based on configuration compression network congestion and other factors. The accuracy and timeliness of data received is not guaranteed; delays or omissions may occur.We do not log any user activity (sites visited DNS lookups emails etc.) We only log access attempts to our servers (for security and troubleshooting). We do not get involved in any form of censorship. We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction and the vast majority of these requests would not be from a court of competent jurisdiction. We will protect you to the max and our system is setup to automatically do so. There are hundreds of good reasons for being anonymous and we respect them fully.Hacking cracking distribution of viruses fraudulent activities network sa
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.Terms of ServiceThis is an agreement between you and FastestVPN.com for virtual private network communications services related services and features. It is NOT a service for the commission of criminal acts. It is an anonymity and privacy service. You agree not to violate any laws of any jurisdiction you are originating from or terminating into.You agree to protect your user id/password and our system from unauthorized use. You are responsible for all actions that occur on our servers where the login uses your user id/password.You agree not to use the system for sending spam port scanning scanning for open proxies or open relays sending opt-in email unsolicited email or any type or version of email sent in large quantities even if the email is ultimately sent off of another server. You agree not to launch any pop-ups from our service. You agree not to attack in any way shape or form any other computer or network while on our service.Actual service coverage speeds locations and quality may vary. The Service will attempt to be available at all times except for limited periods for maintenance and repair. However the Service may be subject to unavailability for a variety of factors beyond our control including emergencies third party service failures transmission equipment or network problems or limitations interference signal strength and may be interrupted refused limited or curtailed. We are not responsible for data messages or pages lost not delivered delayed or misdirected because of interruptions or performance issues with the Service or communications services or networks (e.g. T-1 lines or the Internet). We may impose usage or Service limits suspend Service or block certain kinds of usage in our sole discretion to protect users or the Service. Network speed is an estimate and is no indication of the speed at which your or the Service sends or receives data. Actual network speed will vary based on configuration compression network congestion and other factors. The accuracy and timeliness of data received is not guaranteed; delays or omissions may occur.We do not log any user activity (sites visited DNS lookups emails etc.) We only log access attempts to our servers (for security and troubleshooting). We do not get involved in any form of censorship. We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction and the vast majority of these requests would not be from a court of competent jurisdiction. We will protect you to the max and our system is setup to automatically do so. There are hundreds of good reasons for being anonymous and we respect them fully.Hacking cracking distribution of viruses fraudulent activities network sa
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.Terms of ServiceThis is an agreement between you and FastestVPN.com for virtual private network communications services related services and features. It is NOT a service for the commission of criminal acts. It is an anonymity and privacy service. You agree not to violate any laws of any jurisdiction you are originating from or terminating into.You agree to protect your user id/password and our system from unauthorized use. You are responsible for all actions that occur on our servers where the login uses your user id/password.You agree not to use the system for sending spam port scanning scanning for open proxies or open relays sending opt-in email unsolicited email or any type or version of email sent in large quantities even if the email is ultimately sent off of another server. You agree not to launch any pop-ups from our service. You agree not to attack in any way shape or form any other computer or network while on our service.Actual service coverage speeds locations and quality may vary. The Service will attempt to be available at all times except for limited periods for maintenance and repair. However the Service may be subject to unavailability for a variety of factors beyond our control including emergencies third party service failures transmission equipment or network problems or limitations interference signal strength and may be interrupted refused limited or curtailed. We are not responsible for data messages or pages lost not delivered delayed or misdirected because of interruptions or performance issues with the Service or communications services or networks (e.g. T-1 lines or the Internet). We may impose usage or Service limits suspend Service or block certain kinds of usage in our sole discretion to protect users or the Service. Network speed is an estimate and is no indication of the speed at which your or the Service sends or receives data. Actual network speed will vary based on configuration compression network congestion and other factors. The accuracy and timeliness of data received is not guaranteed; delays or omissions may occur.We do not log any user activity (sites visited DNS lookups emails etc.) We only log access attempts to our servers (for security and troubleshooting). We do not get involved in any form of censorship. We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction and the vast majority of these requests would not be from a court of competent jurisdiction. We will protect you to the max and our system is setup to automatically do so. There are hundreds of good reasons for being anonymous and we respect them fully.Hacking cracking distribution of viruses fraudulent activities network sa
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPNJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\unins000.datJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-1SSK8.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-V02LD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-F6R4E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-HC0TS.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-FCV4A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-2448N.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-50CK2.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5L7N2.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-3LDP6.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-59D46.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-CKMSD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-FRGRO.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-BJ8NM.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-PTLVI.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-9ODK7.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-OKMTN.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-QTCOF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-446MI.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-GFG66.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-QNEIM.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-TIP8B.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-NSK8U.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-LFVH5.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-98KKE.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5TM82.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5IUQF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-AHK7Q.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-K9S0M.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-GRQCB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-L8FIT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-4QKGT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-UORP7.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-1RGTV.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-O5MTV.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-IPA77.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-1FT3O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-VTVPL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-05ABD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-EQOPF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-UN9A1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5EDG5.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-K82F0.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-4EJAE.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-HNNPS.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-RU768.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-21P0F.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-57IGR.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-DTS4U.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\ResourcesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-5M6KM.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-JF6RJ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-J9ANF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-8UK12.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-UCO86.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-O5204.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-EJ1T1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-JCL7T.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-4H11H.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-Q7RHP.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QN5KA.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-BERNA.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-4R4LE.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-TSTOA.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QG142.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-T7NGU.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-9HBCL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-J49VG.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-71J6V.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-BTQQJ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-MI83V.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-9BMN3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-FO4BS.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-7L7U1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-4JUC4.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-SADIQ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-OJSLF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-R9V8V.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-K889R.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-PM9AD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-KHPQG.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-5RDD6.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QLSLT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-71JPL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-1155O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\dataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-HMKT1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-NI40A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-GM9LU.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-CUGSD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driverJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\is-SAIVV.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\is-90S23.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windowsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-QA9TR.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-FKPUT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-PG7JG.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-7J76O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-9NM46.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-0UT9M.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-6HO0C.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-VSNQ2.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-O423O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-PBM2F.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-QN43A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-EQ5BP.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-P6RB9.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-3MVJ1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-DDCD3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-6LAFJ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-ISUTF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-9C393.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-0IO2E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-922TB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-SPFH5.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-5P6ME.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-GNQS3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-T49GN.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\spJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\is-D3BH1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\is-T3PGP.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driverJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\is-K5R6R.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386\is-HEM9F.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64\is-0G2RR.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386\is-PE3HT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\releaseJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\release\is-QPO3E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\release\is-1ASBC.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\ServiceJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-IBD4C.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-PTINH.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-84F6J.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-SQ7U6.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-2RVHB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-7I93E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-902P3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-QVSDK.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-GL2TH.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-AVARB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-E9VNL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-63I9E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-J59NL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-6KC91.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-UI3J1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-OTL5D.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-BI62G.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-17VQ7.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-NF2G1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-CS1P9.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-9GVKQ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-JJ40M.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-17D7A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-0G40P.tmpJump to behavior
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeDirectory created: C:\Program Files\FastestVPN\Service\InstallUtil.InstallLog
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeDirectory created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeDirectory created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallState
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\FastestVPN_is1Jump to behavior
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeFile created: C:\Program Files\FastestVPN\Service\InstallUtil.InstallLog
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeFile created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog
          Source: PVUfopbGfc.exeStatic PE information: certificate valid
          Source: unknownHTTPS traffic detected: 104.22.21.170:443 -> 192.168.2.5:49734 version: TLS 1.2
          Source: PVUfopbGfc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: Binary string: System.Configuration.Install.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmp
          Source: Binary string: C:\Users\samuli\source\repos\tap-windows6\devcon\x64\Release\devcon.pdb source: tapinstall.exe, 0000000A.00000000.2343669290.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp, tapinstall.exe, 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp, tapinstall.exe, 0000000B.00000000.2345491583.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp, tapinstall.exe, 0000000B.00000002.2394906784.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp
          Source: Binary string: C:\BuildAgent\work\da2c3d9512902c54\Tooling\obj\Release\System.Web.Cors\System.Web.Cors.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3310997564.0000000004682000.00000002.00000001.01000000.0000004C.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.WindowsService\obj\Release\FastestVPN.WindowsService.pdbe\FastestVPN.WindowsServic source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN\obj\Debug\VPN.pdbB3\3 N3_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3312674428.0000000004752000.00000002.00000001.01000000.0000004E.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.Common\obj\Debug\VPN.Common.pdb source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584576821.0000000005782000.00000002.00000001.01000000.0000000F.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdbSHA256Z source: FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: netsh.exe, 00000032.00000002.2825529110.0000000004E80000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825762645.0000000005320000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857233034.00000000023C9000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857620610.0000000002860000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Cors.pdbSHA256 source: FastestVPN.WindowsService.exe, 0000002F.00000002.3310437304.0000000004662000.00000002.00000001.01000000.00000046.sdmp
          Source: Binary string: E:\nt\dnsrv\sdktools\reskit\content\subinacl\source\obj\i386\subinacl.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, subinacl.exe, subinacl.exe, 0000002B.00000000.2611161261.0000000001001000.00000020.00000001.01000000.00000034.sdmp, subinacl.exe, 0000002B.00000002.2618280142.0000000001001000.00000020.00000001.01000000.00000034.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr
          Source: Binary string: ?&nC:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.pdb# source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Cors.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3310437304.0000000004662000.00000002.00000001.01000000.00000046.sdmp
          Source: Binary string: winmm.pdbUGP source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2856862183.00000000007E7000.00000008.00000001.01000000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.Configuration.Install.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Common\obj\Release\FastestVPN.Common.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3307845165.0000000004522000.00000002.00000001.01000000.00000035.sdmp
          Source: Binary string: Microsoft.Owin.Diagnostics.pdbSHA256 source: FastestVPN.WindowsService.exe, 0000002F.00000002.3311828504.0000000004712000.00000002.00000001.01000000.00000049.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN\obj\Debug\VPN.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3312674428.0000000004752000.00000002.00000001.01000000.0000004E.sdmp
          Source: Binary string: C:\Windows\Microsoft.NET\Framework\v4.0.30319\spNet.SignalR.Core.pdb561934e089\System.dllLISTj! source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000112D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\samuli\source\repos\tap-windows6\src\Release\tap0901.pdb source: is-PBM2F.tmp.1.dr
          Source: Binary string: c:\Users\Junaid AK\Desktop\New folder (2)\SingleInstanceApplication\SingleInstanceApplication\obj\Release\SingleInstanceApplication.pdb source: FastestVPN.exe, 00000034.00000002.2693645936.00000000026F2000.00000002.00000001.01000000.00000012.sdmp
          Source: Binary string: C:\Users\Jason A. Donenfeld\Projects\wireguard-nt\Release\amd64\wireguard.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: Windows\dll\mscorlib.pdbex0 source: FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Hosting.pdbSHA256d"M! source: FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.OpenVpn\obj\Debug\VPN.OpenVpn.pdbRhlh ^h_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3312869455.0000000004762000.00000002.00000001.01000000.0000004F.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterAnalytics\Microsoft.AppCenter.Analytics.WindowsDesktop\obj\Microsoft.AppCenter.Analytics.WindowsDesktop\Release\net472\Microsoft.AppCenter.Analytics.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330206330.0000000006392000.00000002.00000001.01000000.0000002B.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: c:\projects\projectsJ\nfsdk2_1.6\bin\release\win32\nfapi.pdb< source: nfregdrv.exe, 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmp, nfregdrv.exe, 0000001A.00000002.2409400563.0000000010019000.00000002.00000001.01000000.0000000A.sdmp
          Source: Binary string: Hardcodet.NotifyIcon.Wpf.pdbSHA256[ source: FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterCrashes\Microsoft.AppCenter.Crashes.WindowsDesktop\obj\Microsoft.AppCenter.Crashes.WindowsDesktop\Release\net472\Microsoft.AppCenter.Crashes.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3330335816.00000000063A2000.00000002.00000001.01000000.0000002C.sdmp
          Source: Binary string: h:\projects\netfilter3\bin\Release\Win32\nfregdrv.pdb )0THi source: nfregdrv.exe, 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 00000019.00000000.2405650366.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000002.2408828115.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000000.2407706394.0000000000408000.00000002.00000001.01000000.00000009.sdmp, is-1ASBC.tmp.1.dr
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdbSHA256x source: FastestVPN.exe, 00000022.00000002.3298315092.000000000108F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3349122671.000000000BC52000.00000002.00000001.01000000.0000002D.sdmp
          Source: Binary string: \??\C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.pdbtral source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdbmDataDriverData=C:\Windows\System32\Drivers\DriverDataOS=Windows_NTPATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64ProgramData=C:\ProgramDataPUBLIC=C:\Users\PublicSystemDrive=C:SystemRoot=C:\Windows~ source: FastestVPN.exe, 00000022.00000002.3341691329.000000000B474000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\host_release\flutter_windows.dll.pdb source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmp
          Source: Binary string: C:\projects\projectsJ\nfsdk2_1.6\driver_wfp\Win8\Win8Release\x64\netfilter2.pdb source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: netsh.exe, 00000032.00000002.2825529110.0000000004E80000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825762645.0000000005320000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857233034.00000000023C9000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857620610.0000000002860000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: h:\projects\netfilter3\bin\Release\Win32\nfregdrv.pdb source: nfregdrv.exe, 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 00000019.00000000.2405650366.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000002.2408828115.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000000.2407706394.0000000000408000.00000002.00000001.01000000.00000009.sdmp, is-1ASBC.tmp.1.dr
          Source: Binary string: ntdll.pdbUGP source: ComDebug.exe, 00000030.00000002.2670309064.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669964695.0000025FA44F0000.00000004.00000800.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669735713.0000025FA40F3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: $]qEC:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: winmm.pdb source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2856862183.00000000007E7000.00000008.00000001.01000000.00000000.sdmp
          Source: Binary string: agar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.WindowsService\obj\Release\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: $]q!Microsoft.AspNet.SignalR.Core.pdb`,]q)"<>| source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.Common\obj\Debug\VPN.Common.pdbH source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000002.2584576821.0000000005782000.00000002.00000001.01000000.0000000F.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.WireGuard\obj\Debug\VPN.WireGuard.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3314037370.00000000047B2000.00000002.00000001.01000000.00000051.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Data.Local\obj\Release\FastestVPN.Data.Local.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325295176.0000000005DD2000.00000002.00000001.01000000.0000001D.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection.Abstractions/Release/net462/Microsoft.Extensions.DependencyInjection.Abstractions.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3323696936.0000000005952000.00000002.00000001.01000000.00000015.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.WindowsService\obj\Release\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000000.2412885741.0000000000E22000.00000002.00000001.01000000.0000000B.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\A\_work\89\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netstandard\System.Memory.pdbSHA256HXhZm source: FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmp
          Source: Binary string: Microsoft.Owin.pdbSHA256 source: FastestVPN.WindowsService.exe, 0000002F.00000002.3309349757.0000000004592000.00000002.00000001.01000000.00000038.sdmp
          Source: Binary string: /home/runner/work/Flurl/Flurl/src/Flurl/obj/Release/net472/Flurl.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp
          Source: Binary string: /home/runner/work/Flurl/Flurl/src/Flurl/obj/Release/net472/Flurl.pdbSHA256!VN source: FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp
          Source: Binary string: mscorlib.pdb source: FastestVPN.exe, 00000022.00000002.3298315092.000000000108F000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.RAS\obj\Debug\VPN.RAS.pdb source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3313739781.00000000047A2000.00000002.00000001.01000000.00000050.sdmp, is-21P0F.tmp.1.dr
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection.Abstractions/Release/net462/Microsoft.Extensions.DependencyInjection.Abstractions.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3323696936.0000000005952000.00000002.00000001.01000000.00000015.sdmp
          Source: Binary string: C:\Windows\FastestVPN.WindowsService.pdbpdbice.pdb </ source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\projects\wpfanimatedgif\WpfAnimatedGif\obj\Release\net40\WpfAnimatedGif.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3329548380.0000000006312000.00000002.00000001.01000000.00000020.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenter\Microsoft.AppCenter.WindowsDesktop\obj\Microsoft.AppCenter.WindowsDesktop\Release\net472\Microsoft.AppCenter.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.ViewModel\obj\Release\FastestVPN.ViewModel.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmp
          Source: Binary string: Microsoft.Owin.Host.HttpListener.pdbSHA256-( source: FastestVPN.WindowsService.exe, 0000002F.00000002.3309864180.00000000045C2000.00000002.00000001.01000000.0000003A.sdmp
          Source: Binary string: D:\repos\main\SSH2\Release\pdbs\BvUpdateLauncher.pdb source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2856630470.00000000003A9000.00000002.00000001.01000000.00000057.sdmp, Launcher.exe, 00000035.00000000.2781267206.00000000003A8000.00000002.00000001.01000000.00000057.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Security.pdbSHA256U source: FastestVPN.WindowsService.exe, 0000002F.00000002.3311384386.0000000004692000.00000002.00000001.01000000.0000004A.sdmp, is-63I9E.tmp.1.dr
          Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\arm64\driver\wireguard.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Data.Remote\obj\Release\FastestVPN.Data.Remote.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.BLL\obj\Release\FastestVPN.BLL.pdbVepe be_CorDllMainmscoree.dll source: FastestVPN.exe, 00000022.00000002.3325176110.0000000005DC2000.00000002.00000001.01000000.0000001C.sdmp
          Source: Binary string: symbols\exe\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: /_/src/Flurl.Http/obj/Release/net472/Flurl.Http.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.OpenVpn\obj\Debug\VPN.OpenVpn.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3312869455.0000000004762000.00000002.00000001.01000000.0000004F.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Bcl.AsyncInterfaces/Release/net462/Microsoft.Bcl.AsyncInterfaces.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3324194724.0000000005D02000.00000002.00000001.01000000.00000016.sdmp
          Source: Binary string: BouncyCastle.Crypto.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3354869052.000000000DFF2000.00000002.00000001.01000000.00000036.sdmp
          Source: Binary string: Microsoft.Owin.Diagnostics.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3311828504.0000000004712000.00000002.00000001.01000000.00000049.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\arm64\driver\wireguard.pdbGCTL source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: System.ServiceProcess.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\FastestVPN.WindowsService.pdbL source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection/Release/net462/Microsoft.Extensions.DependencyInjection.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3324336785.0000000005D12000.00000002.00000001.01000000.00000017.sdmp
          Source: Binary string: System.Configuration.Install.pdbxF source: FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.WireGuard\obj\Debug\VPN.WireGuard.pdb2;L; >;_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3314037370.00000000047B2000.00000002.00000001.01000000.00000051.sdmp
          Source: Binary string: E:\nt\dnsrv\sdktools\reskit\content\subinacl\source\obj\i386\subinacl.pdbPa source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, subinacl.exe, 0000002B.00000000.2611161261.0000000001001000.00000020.00000001.01000000.00000034.sdmp, subinacl.exe, 0000002B.00000002.2618280142.0000000001001000.00000020.00000001.01000000.00000034.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr
          Source: Binary string: C:\projects\projectsJ\nfsdk2_1.6\driver_wfp\Win8\Win8Release\x64\netfilter2.pdb source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterAnalytics\Microsoft.AppCenter.Analytics.WindowsDesktop\obj\Microsoft.AppCenter.Analytics.WindowsDesktop\Release\net472\Microsoft.AppCenter.Analytics.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3330206330.0000000006392000.00000002.00000001.01000000.0000002B.sdmp
          Source: Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Threading.Tasks.Extensions\netfx\System.Threading.Tasks.Extensions.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324622795.0000000005D32000.00000002.00000001.01000000.00000018.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Diagnostics\obj\Release\FastestVPN.Diagnostics.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324712420.0000000005D42000.00000002.00000001.01000000.00000019.sdmp
          Source: Binary string: C:\Users\Jason A. Donenfeld\Projects\wireguard-nt\Release\arm64\setupapihost.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: c:\projects\projectsJ\nfsdk2_1.6\bin\release\win32\nfapi.pdb source: nfregdrv.exe, 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmp, nfregdrv.exe, 0000001A.00000002.2409400563.0000000010019000.00000002.00000001.01000000.0000000A.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Bcl.AsyncInterfaces/Release/net462/Microsoft.Bcl.AsyncInterfaces.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324194724.0000000005D02000.00000002.00000001.01000000.00000016.sdmp
          Source: Binary string: c:\Users\lodejard\Projects\owin-hosting\src\main\Owin.Startup\obj\Release\Owin.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3307242028.0000000004242000.00000002.00000001.01000000.00000039.sdmp
          Source: Binary string: Microsoft.Owin.Hosting.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.DependencyInjection\obj\Release\FastestVPN.DI.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3323485610.0000000005842000.00000002.00000001.01000000.00000014.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterCrashes\Microsoft.AppCenter.Crashes.WindowsDesktop\obj\Microsoft.AppCenter.Crashes.WindowsDesktop\Release\net472\Microsoft.AppCenter.Crashes.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330335816.00000000063A2000.00000002.00000001.01000000.0000002C.sdmp
          Source: Binary string: nTC:\Windows\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection/Release/net462/Microsoft.Extensions.DependencyInjection.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324336785.0000000005D12000.00000002.00000001.01000000.00000017.sdmp
          Source: Binary string: @&n.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: c:\Users\Junaid AK\Desktop\New folder (2)\SingleInstanceApplication\SingleInstanceApplication\obj\Release\SingleInstanceApplication.pdb@:^: P:_CorDllMainmscoree.dll source: FastestVPN.exe, 00000034.00000002.2693645936.00000000026F2000.00000002.00000001.01000000.00000012.sdmp
          Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.dr
          Source: Binary string: E:\A\_work\89\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netstandard\System.Memory.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmp
          Source: Binary string: C:\projects\wpfanimatedgif\WpfAnimatedGif\obj\Release\net40\WpfAnimatedGif.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3329548380.0000000006312000.00000002.00000001.01000000.00000020.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.BLL\obj\Release\FastestVPN.BLL.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325176110.0000000005DC2000.00000002.00000001.01000000.0000001C.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3298315092.000000000108F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3349122671.000000000BC52000.00000002.00000001.01000000.0000002D.sdmp
          Source: Binary string: Microsoft.Owin.Security.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3311384386.0000000004692000.00000002.00000001.01000000.0000004A.sdmp, is-63I9E.tmp.1.dr
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Common\obj\Release\FastestVPN.Common.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3307845165.0000000004522000.00000002.00000001.01000000.00000035.sdmp
          Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.dr
          Source: Binary string: \??\C:\Windows\Microsoft.AspNet.SignalR.Core.pdbTV source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.00000000011D3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: n0C:\Windows\mscorlib.pdb source: FastestVPN.exe, 00000022.00000002.3330592068.00000000065A8000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceProcess.pdblez source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.AdvancedNetwork\obj\Debug\VPN.AdvancedNetwork.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3312448340.0000000004742000.00000002.00000001.01000000.0000004D.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN\obj\Release\FastestVPN.pdb source: FastestVPN.exe, 00000022.00000000.2464852704.0000000000ABD000.00000002.00000001.01000000.00000011.sdmp
          Source: Binary string: \??\C:\Windows\exe\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.Configuration.Install.pdbpdball.pdb> source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb@\]q^/_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Host.HttpListener.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3309864180.00000000045C2000.00000002.00000001.01000000.0000003A.sdmp
          Source: Binary string: $]q^/_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\amd64\driver\wireguard.pdbGCTL source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenter\Microsoft.AppCenter.WindowsDesktop\obj\Microsoft.AppCenter.WindowsDesktop\Release\net472\Microsoft.AppCenter.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Data.Remote\obj\Release\FastestVPN.Data.Remote.pdbb^|^ n^_CorDllMainmscoree.dll source: FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.DependencyInjection\obj\Release\FastestVPN.DI.pdbY6s6 e6_CorDllMainmscoree.dll source: FastestVPN.exe, 00000022.00000002.3323485610.0000000005842000.00000002.00000001.01000000.00000014.sdmp
          Source: Binary string: \??\C:\Windows\exe\FastestVPN.WindowsService.pdb3 source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\samuli\source\repos\tap-windows6\src\x64\Release\tap0901.pdb source: drvinst.exe, 0000000D.00000003.2367445197.000001E102C35000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.2365465099.000001E102B8C000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.2367245171.000001E102C34000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, SET9DE9.tmp.14.dr
          Source: Binary string: ntdll.pdb source: ComDebug.exe, 00000030.00000002.2670309064.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669964695.0000025FA44F0000.00000004.00000800.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669735713.0000025FA40F3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: /_/src/Flurl.Http/obj/Release/net472/Flurl.Http.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdbSHA256Ci\ source: FastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmp
          Source: Binary string: Microsoft.Owin.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3309349757.0000000004592000.00000002.00000001.01000000.00000038.sdmp
          Source: Binary string: BouncyCastle.Crypto.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3354869052.000000000DFF2000.00000002.00000001.01000000.00000036.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\amd64\driver\wireguard.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: Hardcodet.NotifyIcon.Wpf.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmp
          Source: Binary string: \??\C:\Windows\FastestVPN.WindowsService.pdbdb] source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\FastestVPN.WindowsService.pdb00 source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1ECAC FindFirstFileExW,FindNextFileW,FindClose,10_2_00007FF70AA1ECAC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E0B0 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,10_2_00007FF70AA1E0B0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E810 FindFirstFileExW,10_2_00007FF70AA1E810
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E0B0 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,10_2_00007FF70AA1E0B0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E3630 GetWindowsDirectoryW,FindFirstFileW,FindNextFileW,FindClose,10_2_00007FF70A9E3630
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_0103172D __EH_prolog,#540,#922,#858,#800,#2910,wcslen,#2910,wcslen,#823,GetLastError,_CxxThrowException,#2910,#2910,swprintf,FindFirstFileW,GetLastError,#825,#2910,FindFirstFileW,wcscmp,wcscmp,wcscmp,#535,#942,#942,#535,#942,#942,#800,FindNextFileW,FindClose,#800,43_2_0103172D
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_01031DDF __EH_prolog,#540,#925,#858,#800,#2910,wcslen,wcslen,#2910,wcslen,#823,GetLastError,_CxxThrowException,#2910,#2910,swprintf,FindFirstFileW,GetLastError,#825,#2910,FindFirstFileW,wcscmp,wcscmp,#540,#538,#922,#925,#858,#800,#800,#800,#925,#800,#858,#800,FindNextFileW,FindClose,#800,43_2_01031DDF
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100163B0 GetLogicalDriveStringsW,QueryDosDeviceW,GetDriveTypeW,EnterCriticalSection,LeaveCriticalSection,25_2_100163B0
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\windows10\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\Jump to behavior

          Networking

          barindex
          Source: Malware configuration extractorURLs: bargainnykwo.shop
          Source: Malware configuration extractorURLs: benchillppwo.shop
          Source: Malware configuration extractorURLs: scatterdshsadyi.shop
          Source: Malware configuration extractorURLs: answerrsdo.shop
          Source: Malware configuration extractorURLs: bannngwko.shop
          Source: Malware configuration extractorURLs: affecthorsedpo.shop
          Source: Malware configuration extractorURLs: bouncedgowp.shop
          Source: Malware configuration extractorURLs: radiationnopp.shop
          Source: Malware configuration extractorURLs: publicitttyps.shop
          Source: is-K5R6R.tmp.1.drStatic PE information: Found NDIS imports: FwpsFlowAssociateContext0, FwpsCalloutUnregisterByKey0, FwpmSubLayerAdd0, FwpsQueryPacketInjectionState0, FwpmSubLayerDeleteByKey0, FwpmSubLayerEnum0, FwpmTransactionCommit0, FwpmSubLayerCreateEnumHandle0, FwpmSubLayerDestroyEnumHandle0, FwpmProviderContextDeleteByKey0, FwpmCalloutAdd0, FwpmProviderAdd0, FwpmTransactionAbort0, FwpmEngineOpen0, FwpsAcquireClassifyHandle0, FwpmFilterAdd0, FwpsPendClassify0, FwpsCalloutRegister1, FwpmTransactionBegin0, FwpmEngineClose0, FwpmFreeMemory0, FwpsAcquireWritableLayerDataPointer0, FwpsApplyModifiedLayerData0, FwpsInjectNetworkReceiveAsync0, FwpsFreeCloneNetBufferList0, FwpsInjectionHandleDestroy0, FwpsConstructIpHeaderForTransportPacket0, FwpsAllocateNetBufferAndNetBufferList0, FwpsInjectionHandleCreate0, FwpsInjectTransportReceiveAsync0, FwpsInjectNetworkSendAsync0, FwpsCopyStreamDataToBuffer0, FwpsInjectTransportSendAsync0, FwpsFlowRemoveContext0, FwpsCloneStreamData0, FwpsCompleteClassify0, FwpsStreamInjectAsync0, FwpsReleaseClassifyHandle0, FwpsDiscardClonedStreamData0, FwpmBfeStateGet0, FwpmBfeStateSubscribeChanges0, FwpmBfeStateUnsubscribeChanges0, FwpsFreeNetBufferList0
          Source: is-HEM9F.tmp.1.drStatic PE information: Found NDIS imports: FwpsFreeNetBufferList0, FwpmEngineOpen0, FwpmProviderAdd0, FwpmSubLayerDeleteByKey0, FwpmProviderContextDeleteByKey0, FwpsAcquireClassifyHandle0, FwpsQueryPacketInjectionState0, FwpsFlowAssociateContext0, FwpmSubLayerAdd0, FwpmSubLayerCreateEnumHandle0, FwpmFreeMemory0, FwpmSubLayerEnum0, FwpmSubLayerDestroyEnumHandle0, FwpmCalloutAdd0, FwpmFilterAdd0, FwpmTransactionBegin0, FwpmEngineClose0, FwpmTransactionCommit0, FwpmTransactionAbort0, FwpsCalloutRegister1, FwpsCalloutUnregisterByKey0, FwpsPendClassify0, FwpsInjectionHandleCreate0, FwpsCopyStreamDataToBuffer0, FwpsInjectNetworkReceiveAsync0, FwpsAcquireWritableLayerDataPointer0, FwpsApplyModifiedLayerData0, FwpsAllocateNetBufferAndNetBufferList0, FwpsInjectTransportSendAsync0, FwpsConstructIpHeaderForTransportPacket0, FwpsInjectNetworkSendAsync0, FwpsInjectTransportReceiveAsync0, FwpsFreeCloneNetBufferList0, FwpsInjectionHandleDestroy0, FwpsFlowRemoveContext0, FwpsCloneStreamData0, FwpsCompleteClassify0, FwpsReleaseClassifyHandle0, FwpsDiscardClonedStreamData0, FwpsStreamInjectAsync0, FwpmBfeStateGet0, FwpmBfeStateSubscribeChanges0, FwpmBfeStateUnsubscribeChanges0
          Source: is-0G2RR.tmp.1.drStatic PE information: Found NDIS imports: FwpmFreeMemory0, FwpmEngineOpen0, FwpmEngineClose0, FwpmTransactionBegin0, FwpmTransactionCommit0, FwpmTransactionAbort0, FwpmProviderAdd0, FwpmProviderContextDeleteByKey0, FwpmSubLayerAdd0, FwpmSubLayerDeleteByKey0, FwpmSubLayerCreateEnumHandle0, FwpmSubLayerEnum0, FwpmSubLayerDestroyEnumHandle0, FwpmCalloutAdd0, FwpmFilterAdd0, FwpsFlowAbort0, FwpsInjectionHandleCreate0, FwpsInjectionHandleDestroy0, FwpsRedirectHandleCreate0, FwpsFreeNetBufferList0, FwpsFreeCloneNetBufferList0, FwpsInjectNetworkSendAsync0, FwpsConstructIpHeaderForTransportPacket0, FwpsInjectTransportSendAsync0, FwpsInjectTransportReceiveAsync0, FwpsInjectNetworkReceiveAsync0, FwpsStreamInjectAsync0, FwpsCopyStreamDataToBuffer0, FwpmBfeStateGet0, FwpmBfeStateSubscribeChanges0, FwpmBfeStateUnsubscribeChanges0, FwpsFlowRemoveContext0, FwpsCompleteClassify0, FwpsRedirectHandleDestroy0, FwpsCloneStreamData0, FwpsDiscardClonedStreamData0, FwpsQueryPacketInjectionState0, FwpsApplyModifiedLayerData0, FwpsAcquireWritableLayerDataPointer0, FwpsReleaseClassifyHandle0, FwpsAcquireClassifyHandle0, FwpsFlowAssociateContext0, FwpsCalloutUnregisterByKey0, FwpsPendClassify0, FwpsCalloutRegister1, FwpsAllocateNetBufferAndNetBufferList0
          Source: is-PE3HT.tmp.1.drStatic PE information: Found NDIS imports: FwpmFreeMemory0, FwpmEngineOpen0, FwpmEngineClose0, FwpmTransactionBegin0, FwpmTransactionCommit0, FwpmTransactionAbort0, FwpmProviderAdd0, FwpmProviderContextDeleteByKey0, FwpmSubLayerAdd0, FwpmSubLayerDeleteByKey0, FwpmSubLayerCreateEnumHandle0, FwpmSubLayerEnum0, FwpmSubLayerDestroyEnumHandle0, FwpmCalloutAdd0, FwpmFilterAdd0, FwpsFlowAbort0, FwpsInjectionHandleCreate0, FwpsInjectionHandleDestroy0, FwpsRedirectHandleCreate0, FwpsFreeNetBufferList0, FwpsFreeCloneNetBufferList0, FwpsInjectNetworkSendAsync0, FwpsConstructIpHeaderForTransportPacket0, FwpsInjectTransportSendAsync0, FwpsInjectTransportReceiveAsync0, FwpsInjectNetworkReceiveAsync0, FwpsStreamInjectAsync0, FwpsCopyStreamDataToBuffer0, FwpmBfeStateGet0, FwpmBfeStateSubscribeChanges0, FwpmBfeStateUnsubscribeChanges0, FwpsFlowRemoveContext0, FwpsCompleteClassify0, FwpsRedirectHandleDestroy0, FwpsCloneStreamData0, FwpsDiscardClonedStreamData0, FwpsQueryPacketInjectionState0, FwpsApplyModifiedLayerData0, FwpsAcquireWritableLayerDataPointer0, FwpsReleaseClassifyHandle0, FwpsAcquireClassifyHandle0, FwpsFlowAssociateContext0, FwpsCalloutUnregisterByKey0, FwpsPendClassify0, FwpsCalloutRegister1, FwpsAllocateNetBufferAndNetBufferList0
          Source: global trafficHTTP traffic detected: POST /v2/authenticate HTTP/1.1xplatform: windowsxplatformtoken: _1032024043022Content-Type: application/json; charset=UTF-8Host: api.fastestvpn.comContent-Length: 104Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: api.fastestvpn.com
          Source: unknownHTTP traffic detected: POST /v2/authenticate HTTP/1.1xplatform: windowsxplatformtoken: _1032024043022Content-Type: application/json; charset=UTF-8Host: api.fastestvpn.comContent-Length: 104Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
          Source: svchost.exe, 00000021.00000002.3301147808.00000197506C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS
          Source: svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
          Source: svchost.exe, 00000021.00000003.2555530538.00000197506CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb
          Source: svchost.exe, 00000021.00000002.3302943187.000001975141B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb:pp
          Source: svchost.exe, 00000021.00000002.3300907602.0000019750681000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3303486786.00000197514AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb_
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://aia.entrust.net/ts2-chain256.p7c01
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1085
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1423136
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1423136dumpTranslatedShadersWrite
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1452
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1452expandIntegerPowExpressionsThe
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1512
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1637
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/1936
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2046
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2152
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2152skipVSConstantRegisterZeroIn
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2162
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2273
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2517
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2894
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2970
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/2978
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3027
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3045
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3078
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3205
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3206
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3246
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3246allowClearForRobustResourceInitSome
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3452
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3498
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3502
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3577
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3584
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3586
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3623
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3624
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3625
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3682
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3682allowES3OnFL100Allow
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3729
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3832
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3862
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3965
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3970
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/3997
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4214
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4267
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4324
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4384
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4405
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4428
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4551
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4633
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4646
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4722
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/482
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4836
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4901
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/4937
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5007
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5007disableDrawBuffersIndexedDisable
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5055
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5061
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5281
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5371
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5375
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5421
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5430
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5469
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5535
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5577
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5658
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5658forceGlErrorCheckingForce
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5750
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5750forceRobustResourceInitForce-enable
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5881
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5901
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/5906
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6041
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6041forceInitShaderVariablesForce-enable
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6048
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6141
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6248
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6439
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6651
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6692
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6755
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6860
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6876
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6878
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6929
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/6953
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7036
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7036dumpShaderSourceWrite
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7047
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7172
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7279
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7279cacheCompiledShaderEnable
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7370
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7406
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7488
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7527
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7553
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7556
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7724
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7724disableAnisotropicFilteringDisable
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7760
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7760enableShaderSubstitutionCheck
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7761
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/7761disableProgramCachingDisables
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/8162
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/8172
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/8215
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/8229
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/8280
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://anglebug.com/8280enableTranslatedShaderSubstitutionCheck
          Source: ComDebug.exe, 00000030.00000002.2669360248.0000025FA3DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c0rl.m%L
          Source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCSRSA4096RootG5.crt0E
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3331690013.0000000008C0C000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-K9S0M.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA2.crt0
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1094869
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/110263
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1144207
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1171371
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1181068
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1181193
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1420130
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1434317
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/1456243
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/308366
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/403957
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/550292
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/565179
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/642227
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/642605
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/644669
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/650547
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/672380
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/709351
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/797243
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/809422
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/830046
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/849576
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/883276
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/927470
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/941620
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://crbug.com/941620allowTranslateUniformBlockToStructuredBufferThere
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crl.entrust.net/csbr1.crl0
          Source: FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/g2ca.c1
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crl.entrust.net/g2ca.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crl.entrust.net/ts2ca.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658642223.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
          Source: ComDebug.exe, 00000030.00000003.2658642223.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
          Source: svchost.exe, 00000021.00000002.3301375524.00000197506D3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2448782040.00000197506DB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000026.00000002.3304311299.000001A809400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
          Source: FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
          Source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertCSRSA4096RootG5.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3331690013.0000000008C0C000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-K9S0M.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0F
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
          Source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
          Source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3331690013.0000000008C0C000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0=
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658642223.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
          Source: ComDebug.exe, 00000030.00000003.2658642223.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
          Source: FastestVPN.exe, 00000022.00000002.3331690013.0000000008C26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
          Source: FastestVPN.exe, 00000022.00000002.3342464783.000000000B552000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en8?7
          Source: FastestVPN.exe, 00000022.00000002.3305231314.00000000031FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/FastestVPN;component/Assets/Fonts/outfit-variablefont_wght.ttf
          Source: FastestVPN.exe, 00000022.00000002.3305231314.00000000031FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/FastestVPN;component/Assets/Fonts/outfit-variablefont_wght.ttfd
          Source: svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
          Source: svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xs
          Source: svchost.exe, 00000021.00000003.2554874023.0000019750F79000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2555530538.00000197506CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
          Source: svchost.exe, 00000021.00000003.2515025768.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541963970.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502614487.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485031511.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485860339.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2482424566.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2484074276.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2542242711.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541905024.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2514709235.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541777762.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2570912887.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849328017.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485114424.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2514995683.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2483362613.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485516356.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2515057313.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2555792443.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2514967036.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2570806401.0000019750F0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAA
          Source: svchost.exe, 00000021.00000003.2501552028.0000019750F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAAAAA
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2533181374.0000019750F77000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdes
          Source: svchost.exe, 00000021.00000003.2452981401.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdjbJ
          Source: svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302496212.0000019750F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
          Source: svchost.exe, 00000021.00000003.2515025768.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541963970.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502614487.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485031511.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485860339.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2482424566.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2484074276.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2542242711.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541905024.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2514709235.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541777762.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2570912887.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849328017.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485114424.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2514995683.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2483362613.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485516356.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2515057313.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2555792443.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2514967036.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2570806401.0000019750F0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA
          Source: svchost.exe, 00000021.00000003.2501552028.0000019750F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
          Source: svchost.exe, 00000021.00000003.2501552028.0000019750F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAA
          Source: svchost.exe, 00000021.00000003.2554874023.0000019750F79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdP
          Source: svchost.exe, 00000021.00000003.2452981401.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdmlns:
          Source: svchost.exe, 00000021.00000003.2849192138.0000019750F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdxV
          Source: svchost.exe, 00000021.00000002.3302943187.000001975141B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
          Source: svchost.exe, 00000026.00000003.2482684273.000001A809250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
          Source: FastestVPN.exe, 00000022.00000002.3342464783.000000000B584000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmpString found in binary or memory: http://ip-api.com/json
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://issuetracker.google.com/200067929
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://james.newtonking.com/projects/json
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://labs.creativecommons.org/licenses/zero-waive/1.0/us/legalcodeRegularVersion
          Source: powershell.exe, 00000023.00000002.2497354949.000000000649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
          Source: ComDebug.exe, 00000030.00000002.2669360248.0000025FA3DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.co
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3331690013.0000000008C0C000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.dr, is-K9S0M.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0A
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.dr, is-K9S0M.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0H
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0I
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0O
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0X
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://ocsp.entrust.net00
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://ocsp.entrust.net01
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://ocsp.entrust.net03
          Source: ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0.
          Source: svchost.exe, 00000021.00000002.3302943187.000001975141B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2520630226.0000019751404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://passport.net/tb
          Source: powershell.exe, 00000023.00000002.2491969070.0000000005582000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org
          Source: FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
          Source: FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.ServiceProcess
          Source: FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/System.ServiceProcessd
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: svchost.exe, 00000021.00000003.2485031511.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2482424566.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2484074276.0000019750F0F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2485114424.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2483362613.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302224787.0000019750F5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
          Source: svchost.exe, 00000021.00000002.3302127607.0000019750F37000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
          Source: svchost.exe, 00000021.00000002.3302070338.0000019750F13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849011574.0000019750F74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2490193566.0000019750F66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849192138.0000019750F6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2490193566.0000019750F66000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302371401.0000019750F6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy=80600
          Source: svchost.exe, 00000021.00000002.3302070338.0000019750F13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849011574.0000019750F74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302224787.0000019750F5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
          Source: svchost.exe, 00000021.00000002.3302127607.0000019750F37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scce
          Source: svchost.exe, 00000021.00000002.3302127607.0000019750F37000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2541777762.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849328017.0000019750F0E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2858748001.0000019750F66000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302070338.0000019750F13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2526630515.0000019750F5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849011574.0000019750F74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2490193566.0000019750F66000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2526603315.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302224787.0000019750F5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
          Source: svchost.exe, 00000021.00000003.2555530538.00000197506CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue02
          Source: svchost.exe, 00000021.00000003.2490193566.0000019750F66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuels
          Source: svchost.exe, 00000021.00000003.2849192138.0000019750F6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302371401.0000019750F6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesue
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesue1
          Source: svchost.exe, 00000021.00000002.3301375524.00000197506D3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849192138.0000019750F6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2526630515.0000019750F5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2490193566.0000019750F66000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302371401.0000019750F6F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2526603315.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849192138.0000019750F6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302371401.0000019750F6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2491969070.0000000005431000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001B76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: http://signalr.net/
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmpString found in binary or memory: http://temp.com
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmpString found in binary or memory: http://temp.com/
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000000.2464852704.0000000000ABD000.00000002.00000001.01000000.00000011.sdmp, FastestVPN.exe, 00000022.00000002.3329548380.0000000006312000.00000002.00000001.01000000.00000020.sdmpString found in binary or memory: http://wpfanimatedgif.codeplex.com
          Source: powershell.exe, 00000023.00000002.2491969070.0000000005582000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3331690013.0000000008C0C000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-K9S0M.tmp.1.dr, is-21P0F.tmp.1.drString found in binary or memory: http://www.digicert.com/CPS0
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://www.entrust.net/rpa0
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: http://www.entrust.net/rpa03
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3327433102.00000000060BA000.00000002.00000001.01000000.0000001F.sdmp, FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmpString found in binary or memory: http://www.hardcodet.net/projects/wpf-notifyicon
          Source: FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmpString found in binary or memory: http://www.hardcodet.net/taskbar
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA3FB2000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.00000000051EC000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.000000000272B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
          Source: powershell.exe, 00000023.00000002.2503961408.0000000007BEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
          Source: FastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.o
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: http://www.w3c.orghttp://dev.w3.org/CSS/fonts/ahem/COPYING
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
          Source: svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=806011
          Source: svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
          Source: svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
          Source: svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438249849.0000019750F57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwam
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwamvice
          Source: powershell.exe, 00000023.00000002.2491969070.0000000005431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/4674
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/4830
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/4849
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/4966
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/5140
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/5536
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/5845
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/6574
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7161
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7162
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7246
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7246enableCaptureLimitsSet
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7308
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7319
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7320
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7369
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7382
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7405
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7489
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7604
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7714
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7847
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://anglebug.com/7899
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.fastestvpn.com
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://api.fastestvpn.com//v2/chat
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmpString found in binary or memory: https://api.fastestvpn.com/v2
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.fastestvpn.com/v2/authenticate
          Source: FastestVPN.exe, 00000022.00000002.3305231314.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.fastestvpn.com/v2/authenticateWN
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://chromium.googlesource.com/angle/angle/
          Source: powershell.exe, 00000023.00000002.2497354949.000000000649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000023.00000002.2497354949.000000000649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000023.00000002.2497354949.000000000649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1042393
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1046462
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1060012
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1091824
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1137851
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1300575
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/1356053
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/593024
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/593024selectViewInGeometryShaderThe
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/650547
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/650547callClearTwiceUsing
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/655534
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/655534useSystemMemoryForConstantBuffersCopying
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/705865
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/710443
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/811661
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://crbug.com/848952
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
          Source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://dartbug.com/52121.
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://dartbug.com/52121.Dart_WaitForEventwaitForEventSync
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://dartbug.com/52121.enable_deprecated_wait_fordart::../../third_party/dart/runtime/vm/dart_api
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/about
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/buy-vpn
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/buy-vpn?device=windows
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/faq?device=windows
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/password/reset
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/privacy-policy
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpString found in binary or memory: https://fastestvpn.com/terms-of-service?device=windows
          Source: FastestVPN.exeString found in binary or memory: https://fastestvpn.com/upgrade?t=ndelyNN7yduAc
          Source: FastestVPN.exe, 00000022.00000002.3325176110.0000000005DC2000.00000002.00000001.01000000.0000001C.sdmpString found in binary or memory: https://fastestvpn.com/upgrade?t=ndelyNN7yduAc5Enjoy
          Source: svchost.exe, 00000026.00000003.2482684273.000001A8092C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
          Source: svchost.exe, 00000026.00000003.2482684273.000001A809250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: https://github.com/JamesNK/Newtonsoft.Json
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/JamesNK/Newtonsoft.Jsond
          Source: FastestVPN.exe, 00000022.00000000.2464852704.00000000008F2000.00000002.00000001.01000000.00000011.sdmp, FastestVPN.exe, 00000022.00000002.3338344676.0000000009112000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Outfitio/Outfit-Fonts)
          Source: powershell.exe, 00000023.00000002.2491969070.0000000005582000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: https://github.com/SignalR/SignalR/tree/7f53f266daf1aad3dabb1b6d7a71d4c1501ec8dc
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/SignalR/SignalR/tree/7f53f266daf1aad3dabb1b6d7a71d4c1501ec8dcd
          Source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3309349757.0000000004592000.00000002.00000001.01000000.00000038.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3309864180.00000000045C2000.00000002.00000001.01000000.0000003A.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3311384386.0000000004692000.00000002.00000001.01000000.0000004A.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3310437304.0000000004662000.00000002.00000001.01000000.00000046.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3311828504.0000000004712000.00000002.00000001.01000000.00000049.sdmp, is-63I9E.tmp.1.drString found in binary or memory: https://github.com/aspnet/AspNetKatana
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/aspnet/AspNetKatanad
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://github.com/dart-lang/sdk/blob/master/runtime/docs/compiler/aot/entry_point_pragma.md
          Source: FastestVPN.exeString found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ff
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324622795.0000000005D32000.00000002.00000001.01000000.00000018.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f
          Source: FastestVPN.exe, 00000022.00000002.3324622795.0000000005D32000.00000002.00000001.01000000.00000018.sdmp, FastestVPN.exe, 00000022.00000002.3352829401.000000000C1D2000.00000002.00000001.01000000.00000031.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f8
          Source: FastestVPN.exeString found in binary or memory: https://github.com/dotnet/corefx/tree/c6cf790234e
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/c6cf790234e063b855fcdb50f3fb1b3cfac73275
          Source: FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmpString found in binary or memory: https://github.com/dotnet/corefx/tree/c6cf790234e063b855fcdb50f3fb1b3cfac732758
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324336785.0000000005D12000.00000002.00000001.01000000.00000017.sdmp, FastestVPN.exe, 00000022.00000002.3324194724.0000000005D02000.00000002.00000001.01000000.00000016.sdmp, FastestVPN.exe, 00000022.00000002.3323696936.0000000005952000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: https://github.com/dotnet/runtime
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmp, FastestVPN.exe, 00000022.00000002.3349122671.000000000BC52000.00000002.00000001.01000000.0000002D.sdmp, FastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmpString found in binary or memory: https://github.com/ericsink/SQLitePCL.raw
          Source: FastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmpString found in binary or memory: https://github.com/ericsink/SQLitePCL.rawH
          Source: FastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmpString found in binary or memory: https://github.com/ericsink/SQLitePCL.rawX
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://github.com/flutter/flutter/issues.
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://github.com/flutter/flutter/issues.Invalid
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmpString found in binary or memory: https://github.com/hardcodet/wpf-notifyicon
          Source: FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmpString found in binary or memory: https://github.com/hardcodet/wpf-notifyicon.
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp, FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmpString found in binary or memory: https://github.com/tmenier/Flurl.git
          Source: FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp, FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmpString found in binary or memory: https://github.com/tmenier/Flurl.git5
          Source: powershell.exe, 00000023.00000002.2491969070.0000000005582000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmpString found in binary or memory: https://in.appcenter.ms
          Source: FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmpString found in binary or memory: https://in.appcenter.ms./logs?api-version=1.0.0
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/161903006
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/166809097
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/184850002
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/187425444
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/220069903
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/220069903emulatePixelLocalStorageEmulate
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/229267970
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/250706693
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/253522366
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/255411748
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/258207403
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/274859104
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/284462263
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpString found in binary or memory: https://issuetracker.google.com/issues/166475273
          Source: PVUfopbGfc.exe, 00000000.00000000.2036244476.0000000000401000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.ecur
          Source: svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srfe.com
          Source: svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80600
          Source: svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80601
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
          Source: svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf53457
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
          Source: svchost.exe, 00000021.00000002.3302943187.000001975141B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
          Source: svchost.exe, 00000021.00000003.2438027377.0000019750F10000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
          Source: svchost.exe, 00000021.00000003.2438372704.0000019750F27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srff
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
          Source: svchost.exe, 00000021.00000003.2438372704.0000019750F27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srfX
          Source: svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srfr
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrf
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
          Source: svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
          Source: svchost.exe, 00000021.00000003.2526466268.0000019750F5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-DlFziMZwIidRWaxddTIZTnitsKqk4l9lNorD2f9K
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600UE
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438334304.0000019750F6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
          Source: svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
          Source: svchost.exe, 00000021.00000002.3302943187.000001975141B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srft
          Source: svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfue
          Source: svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=805025
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502R
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438249849.0000019750F57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&amp;fid=cp
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438051525.0000019750F5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
          Source: svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
          Source: svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srfrf
          Source: svchost.exe, 00000021.00000003.2438027377.0000019750F10000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srfLive
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/retention.srf
          Source: svchost.exe, 00000021.00000002.3301375524.00000197506D3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2526630515.0000019750F5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2502574094.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2526603315.0000019750F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf
          Source: svchost.exe, 00000021.00000002.3303189123.000001975146F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com:443/RST2.srfityCRL
          Source: svchost.exe, 00000021.00000002.3303288355.0000019751481000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comM
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300825248.000001975065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
          Source: svchost.exe, 00000021.00000003.2438027377.0000019750F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
          Source: svchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
          Source: svchost.exe, 00000021.00000003.2438372704.0000019750F27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMM
          Source: svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
          Source: svchost.exe, 00000021.00000003.2438027377.0000019750F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfRE
          Source: powershell.exe, 00000023.00000002.2497354949.000000000649B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: FastestVPN.exe, 00000022.00000002.3338344676.0000000009112000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scripts.sil.org/OFL
          Source: FastestVPN.exe, 00000022.00000000.2464852704.00000000008F2000.00000002.00000001.01000000.00000011.sdmpString found in binary or memory: https://scripts.sil.org/OFLThis
          Source: FastestVPN.exe, 00000022.00000000.2464852704.00000000008F2000.00000002.00000001.01000000.00000011.sdmpString found in binary or memory: https://scripts.sil.org/OFLwww.rfuenzalida.comwww.fragtypefoundry.xyzRodrigo
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669360248.0000025FA3DB0000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658642223.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0
          Source: svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://signup.live.com/signup.aspx
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, is-PBM2F.tmp.1.drString found in binary or memory: https://www.digicert.com/CPS0
          Source: ComDebug.exe, 00000030.00000002.2669360248.0000025FA3DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.comP/CPS
          Source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drString found in binary or memory: https://www.entrust.net/rpa0
          Source: PVUfopbGfc.exe, 00000000.00000003.2704325303.0000000002316000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.exe, 00000000.00000003.2036701725.0000000002870000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2042009552.00000000034D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.fastestvpn.com/
          Source: PVUfopbGfc.exe, 00000000.00000003.2038232664.000000007FB7B000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.exe, 00000000.00000003.2037873390.0000000002870000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000000.2039732775.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.innosetup.com/
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: https://www.newtonsoft.com/json
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: https://www.newtonsoft.com/jsonschema
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.drString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
          Source: PVUfopbGfc.exe, 00000000.00000003.2038232664.000000007FB7B000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.exe, 00000000.00000003.2037873390.0000000002870000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000000.2039732775.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.remobjects.com/ps
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wireguard.com/
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wireguard.com/D
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wireguard.com/donations/key
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wireguard.com/initSpan:
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wireguard.net/D
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownHTTPS traffic detected: 104.22.21.170:443 -> 192.168.2.5:49734 version: TLS 1.2
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: &Configuration:,M3.2.0,M11.1.0/managerservice476837158203125: cannot parse <invalid Value>ASCII_Hex_DigitAbout WireGuardAddDllDirectoryAddresses: NoneCLSIDFromStringCallWindowProcWCreateHardLinkWCreatePopupMenuCreateWindowExWDeviceIoControlDialogBoxParamWDragAcceptFilesDrawThemeTextExDuplicateHandleExcludeClipRectFailed to find Failed to load FindNextVolumeWFindVolumeCloseFlushViewOfFileFwpmEngineOpen0FwpmFreeMemory0GdiplusShutdownGetActiveWindowGetAdaptersInfoGetCommTimeoutsGetCommandLineWGetDpiForWindowGetEnhMetaFileWGetModuleHandleGetMonitorInfoWGetProcessTimesGetRawInputDataGetSecurityInfoGetStartupInfoWGetTextMetricsWGetThreadLocaleHanifi_RohingyaImpersonateSelfInsertMenuItemWInvalid key: %vIsWindowEnabledIsWindowVisibleIsWow64Process2NTSTATUS 0x%08xNotTrueTypeFontOleUninitializeOpenThreadTokenOther_LowercaseOther_UppercasePlayEnhMetaFilePostQuitMessageProcess32FirstWProfileNotFoundPsalter_PahlaviPublicKey = %smemstr_e269cfe5-2
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-O423O.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeFile created: C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\SET9446.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\FastestVPN.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\SET98AB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-PG7JG.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeFile created: C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\tap0901.cat (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-SPFH5.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tap0901.cat (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\tap0901.cat (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tap0901.cat (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\tap0901.cat (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-DDCD3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tap0901.cat (copy)Jump to dropped file

          Spam, unwanted Advertisements and Ransom Demands

          barindex
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System

          System Summary

          barindex
          Source: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmp, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10014000: ?nf_getDriverType@nfapi@@YAKXZ,EnterCriticalSection,LeaveCriticalSection,DeviceIoControl,LeaveCriticalSection,LeaveCriticalSection,25_2_10014000
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100134A0 ?nf_unRegisterDriver@nfapi@@YA?AW4_NF_STATUS@@PBD@Z,OpenSCManagerA,OpenServiceA,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,SetLastError,25_2_100134A0
          Source: C:\Windows\System32\xcopy.exeFile created: C:\Windows\system32\drivers\fastestvpndriver.sys
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}Jump to behavior
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_6d4bec28a2ef0cdfJump to behavior
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmpJump to behavior
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem4.infJump to behavior
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\SET9DE9.tmpJump to behavior
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\SET9DE9.tmpJump to behavior
          Source: C:\Windows\System32\xcopy.exeFile created: C:\Windows\system32\drivers\fastestvpndriver.sys
          Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
          Source: C:\Windows\System32\drvinst.exeFile deleted: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\SET989A.tmpJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E41D010_2_00007FF70A9E41D0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E52E010_2_00007FF70A9E52E0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA04B7C10_2_00007FF70AA04B7C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2292010_2_00007FF70AA22920
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E703010_2_00007FF70A9E7030
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA04E5C10_2_00007FF70AA04E5C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA283E410_2_00007FF70AA283E4
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2434010_2_00007FF70AA24340
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA0443010_2_00007FF70AA04430
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA041AC10_2_00007FF70AA041AC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2216010_2_00007FF70AA22160
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E0B010_2_00007FF70AA1E0B0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA322DC10_2_00007FF70AA322DC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2A7C010_2_00007FF70AA2A7C0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E81010_2_00007FF70AA1E810
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1C73810_2_00007FF70AA1C738
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA0491410_2_00007FF70AA04914
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA0469810_2_00007FF70AA04698
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA266E810_2_00007FF70AA266E8
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1264010_2_00007FF70AA12640
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA29BC010_2_00007FF70AA29BC0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA03C8C10_2_00007FF70AA03C8C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA059DC10_2_00007FF70AA059DC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E0B010_2_00007FF70AA1E0B0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2A07010_2_00007FF70AA2A070
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1BD1810_2_00007FF70AA1BD18
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA13F1410_2_00007FF70AA13F14
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA03F1010_2_00007FF70AA03F10
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E13E010_2_00007FF70A9E13E0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA0543010_2_00007FF70AA05430
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2115410_2_00007FF70AA21154
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9EB1FC10_2_00007FF70A9EB1FC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2115410_2_00007FF70AA21154
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA0515010_2_00007FF70AA05150
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2D16810_2_00007FF70AA2D168
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA056FC10_2_00007FF70AA056FC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA296F010_2_00007FF70AA296F0
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_0040292025_2_00402920
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_00404DDB25_2_00404DDB
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_1000206025_2_10002060
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_1000A0A025_2_1000A0A0
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10009A8125_2_10009A81
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10005C6025_2_10005C60
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_1000BD2125_2_1000BD21
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_1000162025_2_10001620
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_0578336629_2_05783366
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_057838B429_2_057838B4
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_01750D4D29_2_01750D4D
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D16E5834_2_05D16E58
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1701A34_2_05D1701A
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1712E34_2_05D1712E
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D73C1A34_2_05D73C1A
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D72FE234_2_05D72FE2
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_060A490034_2_060A4900
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_060A5CD634_2_060A5CD6
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BE3317E34_2_0BE3317E
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BE3305A34_2_0BE3305A
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BE3479934_2_0BE34799
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C175D0B34_2_0C175D0B
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C17BB5934_2_0C17BB59
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1726E834_2_0C1726E8
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1E5C5234_2_0C1E5C52
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_02D2384834_2_02D23848
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_02D2D26234_2_02D2D262
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_02D2D06234_2_02D2D062
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_02D2D03534_2_02D2D035
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_02D2D16234_2_02D2D162
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_063256C034_2_063256C0
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0632B09034_2_0632B090
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_06327B3034_2_06327B30
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0632043934_2_06320439
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_06320D2834_2_06320D28
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_06320D1834_2_06320D18
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BD62A4034_2_0BD62A40
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BDF04A134_2_0BDF04A1
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1BCDB034_2_0C1BCDB0
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1B817834_2_0C1B8178
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1BC19834_2_0C1BC198
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1B636034_2_0C1B6360
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0C1BC4E034_2_0C1BC4E0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_0367A52835_2_0367A528
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_0367ADF835_2_0367ADF8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_0367A1E035_2_0367A1E0
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 42_2_00A65F2742_2_00A65F27
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 42_2_00A65F3842_2_00A65F38
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 42_2_00A65F4842_2_00A65F48
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_010383F643_2_010383F6
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_04523D9F47_2_04523D9F
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_0452699C47_2_0452699C
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_045C5F9F47_2_045C5F9F
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_045C598847_2_045C5988
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_046976B747_2_046976B7
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_0471571D47_2_0471571D
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_047A398647_2_047A3986
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_0480699847_2_04806998
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_048033B947_2_048033B9
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_0480327647_2_04803276
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_04805D9D47_2_04805D9D
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeProcess token adjusted: Load DriverJump to behavior
          Source: C:\Windows\System32\svchost.exeProcess token adjusted: SecurityJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: String function: 1000A044 appears 35 times
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: String function: 0103E03C appears 110 times
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: String function: 0103E368 appears 75 times
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: String function: 00007FF70AA181A8 appears 48 times
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6276 -ip 6276
          Source: PVUfopbGfc.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
          Source: is-1SSK8.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
          Source: PVUfopbGfc.exe, 00000000.00000003.2037873390.0000000002942000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs PVUfopbGfc.exe
          Source: PVUfopbGfc.exe, 00000000.00000003.2038232664.000000007FE2E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs PVUfopbGfc.exe
          Source: PVUfopbGfc.exe, 00000000.00000000.2036420422.00000000004B9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs PVUfopbGfc.exe
          Source: PVUfopbGfc.exeBinary or memory string: OriginalFileName vs PVUfopbGfc.exe
          Source: PVUfopbGfc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
          Source: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmp, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: is-FRGRO.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: is-OTL5D.tmp.1.drBinary string: Type the password for user :--- DEBUG NetDfsGetClientInfo Dfs path detected = --- DEBUG NetDfsGetClientInfo NetStatus = --- DEBUG NetDfsGetClientInfo DfsPath to check = \\%[^\]\%[^\]--- DEBUG NetDfsGetClientInfo exists in NetApi32.lib. DfsPath is checked = --- DEBUG NetDfsGetClientInfo not existing in NetApi32.lib. DfsPath not checked = NetDfsGetClientInfoNetApi32.dll--- DEBUG FileFullPathName Default Sam Server will be = --- DEBUG FileFullPathName ShareName is = --- DEBUG FileFullPathName Server is = \Device\LanmanRedirector\;%[^\]\%[^\]\%s\Device\LanmanRedirector\\Device\WinDfs\ privileges to run this tool successfullyYou may need privilege. This privilege may be required. WARNING :Unable to set SeDebugPrivilegeSeChangeNotifyPrivilegeSeTakeOwnershipPrivilegeSeBackupPrivilegeSeSecurityPrivilegeSeRestorePrivilegeCheckPriv : Memory ExhaustedParsing registry key error :Could not open Sam Server :Error OpenSCManager : will not be processed. Dfs path is not supported--- DEBUG ObjCreateInstance - Error FileFullPathName = Remote access is not allowed for kernelobject or process--- DEBUG ObjCreateInstance - Default Sam Server will be = - DfsPath is not supported
          Source: SET9DE9.tmp.14.drBinary string: \Device\
          Source: is-PBM2F.tmp.1.drBinary string: \Device\.tap\DosDevices\Global\.tapdiagTAP-Windows Adapter V9
          Source: classification engineClassification label: mal76.troj.spyw.expl.evad.winEXE@83/372@1/2
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E52E0 CharNextW,CharNextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,InitiateSystemShutdownExW,10_2_00007FF70A9E52E0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E4D80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,InitiateSystemShutdownExW,10_2_00007FF70A9E4D80
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100139D0 ?nf_adjustProcessPriviledges@nfapi@@YAXXZ,GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,LookupPrivilegeValueA,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,CloseHandle,CloseHandle,25_2_100139D0
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_0101CA79 LookupPrivilegeValueW,AdjustTokenPrivileges,PrivilegeCheck,GetLastError,_CxxThrowException,43_2_0101CA79
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: OpenSCManagerA,CreateServiceW,CloseServiceHandle,GetLastError,GetLastError,OpenServiceA,QueryServiceStatus,StartServiceA,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetLastError,25_2_10013540
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10013540 OpenSCManagerA,CreateServiceW,CloseServiceHandle,GetLastError,GetLastError,OpenServiceA,QueryServiceStatus,StartServiceA,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetLastError,25_2_10013540
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_019B13E8 StartServiceCtrlDispatcherW,47_2_019B13E8
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 47_2_019B13E1 StartServiceCtrlDispatcherW,47_2_019B13E1
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPNJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Users\Public\Desktop\FastestVPN.lnkJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6648:120:WilError_03
          Source: C:\Windows\System32\drvinst.exeMutant created: \BaseNamedObjects\DrvInst.exe_mutex_{5B10AC83-4F13-4fde-8C0B-B85681BA8D73}
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMutant created: NULL
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMutant created: \Sessions\1\BaseNamedObjects\Global\netfxeventlog.1.0
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6276
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5008:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5684:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6608:120:WilError_03
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMutant created: \Sessions\1\BaseNamedObjects\F7ADS2TDE9SFT7VCP4NAF2A1S4TAE7S8TBVDPEN5FAA3S0T3EFS6T1V4PDN4F8user
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeMutant created: \Sessions\1\BaseNamedObjects\DVRAY
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMutant created: \Sessions\1\BaseNamedObjects\Global\8C9EED5B-604B-4700-866A-6A9606527CC6
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3556:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3856:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5388:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5380:120:WilError_03
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeFile created: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\driver\install_tap.bat""
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCommand line argument: nfregdvr25_2_00401050
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile read: C:\Program Files\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
          Source: PVUfopbGfc.exeReversingLabs: Detection: 21%
          Source: tapinstall.exeString found in binary or memory: itioned on the newly-added filter. ! Deletes the next occurrence of the specified filter. When the subcommand
          Source: tapinstall.exeString found in binary or memory: of the list. When the subcommand completes, the cursor is positioned on the newly-added filter. + Add after. I
          Source: FastestVPN.WindowsService.exeString found in binary or memory: registerHubProxies(proxies, true); this._registerSubscribedHubs(); }).disconnected(function () { // Unsubscribe all hub proxies when we "disconnect". This is to ensure that we do not re-add functional call backs.
          Source: FastestVPN.WindowsService.exeString found in binary or memory: /installtunnelservice "
          Source: PVUfopbGfc.exeString found in binary or memory: /LOADINF="filename"
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeFile read: C:\Users\user\Desktop\PVUfopbGfc.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\PVUfopbGfc.exe "C:\Users\user\Desktop\PVUfopbGfc.exe"
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp "C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp" /SL5="$1046E,20382094,735744,C:\Users\user\Desktop\PVUfopbGfc.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\driver\install_tap.bat""
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "x86"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ver
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe tapinstall.exe remove tap0901
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe tapinstall.exe install OemVista.inf tap0901
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\oemvista.inf" "9" "4d14a44ff" "0000000000000160" "WinSta0\Default" "0000000000000158" "208" "c:\program files\fastestvpn\resources\driver\windows10\amd64"
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:3beb73aff103cc24:tap0901.ndi:9.24.2.601:tap0901," "4d14a44ff" "0000000000000180"
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\sp\install_sp.bat""
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop fastestvpndriver
          Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "x86"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "Windows 7"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\drivers
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe release\nfregdrv.exe -u fastestvpndriver
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe release\nfregdrv.exe fastestvpndriver
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\sc.exe "C:\Windows\system32\sc.exe" stop FastestVPNService
          Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --uninstall
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6276 -ip 6276
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 1076
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
          Source: unknownProcess created: C:\Program Files\FastestVPN\FastestVPN.exe "C:\Program Files\FastestVPN\FastestVPN.exe" -autorun
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\sc.exe "C:\Windows\system32\sc.exe" delete FastestVPNService
          Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --install
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\subinacl.exe "C:\Program Files\FastestVPN\subinacl.exe" /service FastestVPNService /GRANT=everyone=TO
          Source: C:\Program Files\FastestVPN\subinacl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\sc.exe "C:\Windows\system32\sc.exe" start FastestVPNService
          Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\Resources\ComDebug.exe "C:\Program Files\FastestVPN\Resources\ComDebug.exe"
          Source: C:\Windows\SysWOW64\WerFault.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\FastestVPN.exe "C:\Program Files\FastestVPN\FastestVPN.exe"
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Users\user\AppData\Local\Temp\Launcher.exe C:\Users\user\AppData\Local\Temp\Launcher.exe
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp "C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp" /SL5="$1046E,20382094,735744,C:\Users\user\Desktop\PVUfopbGfc.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\driver\install_tap.bat""Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\sp\install_sp.bat""Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\sc.exe "C:\Windows\system32\sc.exe" stop FastestVPNServiceJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\sc.exe "C:\Windows\system32\sc.exe" delete FastestVPNServiceJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe "C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --installJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\subinacl.exe "C:\Program Files\FastestVPN\subinacl.exe" /service FastestVPNService /GRANT=everyone=TOJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Windows\System32\find.exe find /i "Windows 7" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\Resources\ComDebug.exe "C:\Program Files\FastestVPN\Resources\ComDebug.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess created: C:\Program Files\FastestVPN\FastestVPN.exe "C:\Program Files\FastestVPN\FastestVPN.exe"Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "x86" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe tapinstall.exe remove tap0901Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe tapinstall.exe install OemVista.inf tap0901Jump to behavior
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\oemvista.inf" "9" "4d14a44ff" "0000000000000160" "WinSta0\Default" "0000000000000158" "208" "c:\program files\fastestvpn\resources\driver\windows10\amd64"Jump to behavior
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:3beb73aff103cc24:tap0901.ndi:9.24.2.601:tap0901," "4d14a44ff" "0000000000000180"Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop fastestvpndriverJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "x86" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "Windows 7" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\driversJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe release\nfregdrv.exe -u fastestvpndriverJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe release\nfregdrv.exe fastestvpndriverJump to behavior
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6276 -ip 6276
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 1076
          Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
          Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
          Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Users\user\AppData\Local\Temp\Launcher.exe C:\Users\user\AppData\Local\Temp\Launcher.exe
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: msftedit.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: windows.globalization.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: bcp47mrm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: globinputhost.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: windows.ui.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: windowmanagementapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: inputhost.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: explorerframe.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: sfc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: sfc_os.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: linkinfo.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: ntshrui.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: cscapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
          Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: devrtl.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: spinf.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: drvstore.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: newdev.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: umpnpmgr.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: devrtl.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netsetupsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netsetupapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netsetupengine.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: implatsetup.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: devrtl.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: spinf.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: drvstore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netsetupengine.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: implatsetup.dllJump to behavior
          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
          Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\xcopy.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\xcopy.exeSection loaded: ifsutil.dll
          Source: C:\Windows\System32\xcopy.exeSection loaded: devobj.dll
          Source: C:\Windows\System32\xcopy.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\xcopy.exeSection loaded: ntmarta.dll
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeSection loaded: apphelp.dll
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeSection loaded: nfapi.dll
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeSection loaded: nfapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: mscoree.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: apphelp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: kernel.appcore.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: version.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: windows.storage.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: wldp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: profapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: cryptsp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: rsaenh.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: cryptbase.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wlidsvc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msxml6.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: gamestreamingext.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msauserext.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptnet.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptngc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptprov.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: elscore.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: elstrans.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: mscoree.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: apphelp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: kernel.appcore.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: version.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: uxtheme.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: cryptsp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: rsaenh.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: cryptbase.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dwrite.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: msvcp140_clr0400.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: sspicli.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: mswsock.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: windows.storage.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: wldp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: profapi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dwmapi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: d3d9.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: d3d10warp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: urlmon.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: iertutil.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: srvcli.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: netutils.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: windowscodecs.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: wtsapi32.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: winsta.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: powrprof.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: umpdc.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dataexchange.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: d3d11.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dcomp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dxgi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: twinapi.appcore.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: resourcepolicyclient.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dxcore.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: textshaping.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: textinputframework.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: coreuicomponents.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: coremessaging.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ntmarta.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: coremessaging.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: wintypes.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: wintypes.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: wintypes.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: msctfui.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: uiautomationcore.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: propsys.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: d3dcompiler_47.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: winmm.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: msasn1.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: riched20.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: usp10.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: msls31.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: gpapi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: cryptnet.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: iphlpapi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: winnsi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: winhttp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dhcpcsvc6.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dhcpcsvc.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: webio.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: dnsapi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: rasadhlp.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: fwpuclnt.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: wbemcomn.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: amsi.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: userenv.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: rasapi32.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: rasman.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: rtutils.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: secur32.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: schannel.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: mskeyprotect.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ntasn1.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ncrypt.dll
          Source: C:\Program Files\FastestVPN\FastestVPN.exeSection loaded: ncryptsslp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
          Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: mscoree.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: kernel.appcore.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: version.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: windows.storage.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: wldp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: profapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: cryptsp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: rsaenh.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: cryptbase.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: urlmon.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: iertutil.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: srvcli.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: netutils.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: sspicli.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: propsys.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: msasn1.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: riched20.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: usp10.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: msls31.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: gpapi.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: apphelp.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: mfc42u.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: msvcirt.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: msvcp60.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: version.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: netapi32.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: mpr.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: clusapi.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: samlib.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: dnsapi.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: srvcli.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: netutils.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: logoncli.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: samcli.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: iphlpapi.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: kernel.appcore.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: uxtheme.dll
          Source: C:\Program Files\FastestVPN\subinacl.exeSection loaded: ntmarta.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: mscoree.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: kernel.appcore.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: version.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: windows.storage.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: wldp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: profapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: mswsock.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: cryptsp.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: rsaenh.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: cryptbase.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: iphlpapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: httpapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: urlmon.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: iertutil.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: srvcli.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: netutils.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: sspicli.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: propsys.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: dnsapi.dll
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeSection loaded: rasadhlp.dll
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow found: window name: TMainFormJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Install
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: Next
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpAutomated click: I accept the agreement
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.Terms of ServiceThis is an agreement between you and FastestVPN.com for virtual private network communications services related services and features. It is NOT a service for the commission of criminal acts. It is an anonymity and privacy service. You agree not to violate any laws of any jurisdiction you are originating from or terminating into.You agree to protect your user id/password and our system from unauthorized use. You are responsible for all actions that occur on our servers where the login uses your user id/password.You agree not to use the system for sending spam port scanning scanning for open proxies or open relays sending opt-in email unsolicited email or any type or version of email sent in large quantities even if the email is ultimately sent off of another server. You agree not to launch any pop-ups from our service. You agree not to attack in any way shape or form any other computer or network while on our service.Actual service coverage speeds locations and quality may vary. The Service will attempt to be available at all times except for limited periods for maintenance and repair. However the Service may be subject to unavailability for a variety of factors beyond our control including emergencies third party service failures transmission equipment or network problems or limitations interference signal strength and may be interrupted refused limited or curtailed. We are not responsible for data messages or pages lost not delivered delayed or misdirected because of interruptions or performance issues with the Service or communications services or networks (e.g. T-1 lines or the Internet). We may impose usage or Service limits suspend Service or block certain kinds of usage in our sole discretion to protect users or the Service. Network speed is an estimate and is no indication of the speed at which your or the Service sends or receives data. Actual network speed will vary based on configuration compression network congestion and other factors. The accuracy and timeliness of data received is not guaranteed; delays or omissions may occur.We do not log any user activity (sites visited DNS lookups emails etc.) We only log access attempts to our servers (for security and troubleshooting). We do not get involved in any form of censorship. We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction and the vast majority of these requests would not be from a court of competent jurisdiction. We will protect you to the max and our system is setup to automatically do so. There are hundreds of good reasons for being anonymous and we respect them fully.Hacking cracking distribution of viruses fraudulent activities network sa
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.Terms of ServiceThis is an agreement between you and FastestVPN.com for virtual private network communications services related services and features. It is NOT a service for the commission of criminal acts. It is an anonymity and privacy service. You agree not to violate any laws of any jurisdiction you are originating from or terminating into.You agree to protect your user id/password and our system from unauthorized use. You are responsible for all actions that occur on our servers where the login uses your user id/password.You agree not to use the system for sending spam port scanning scanning for open proxies or open relays sending opt-in email unsolicited email or any type or version of email sent in large quantities even if the email is ultimately sent off of another server. You agree not to launch any pop-ups from our service. You agree not to attack in any way shape or form any other computer or network while on our service.Actual service coverage speeds locations and quality may vary. The Service will attempt to be available at all times except for limited periods for maintenance and repair. However the Service may be subject to unavailability for a variety of factors beyond our control including emergencies third party service failures transmission equipment or network problems or limitations interference signal strength and may be interrupted refused limited or curtailed. We are not responsible for data messages or pages lost not delivered delayed or misdirected because of interruptions or performance issues with the Service or communications services or networks (e.g. T-1 lines or the Internet). We may impose usage or Service limits suspend Service or block certain kinds of usage in our sole discretion to protect users or the Service. Network speed is an estimate and is no indication of the speed at which your or the Service sends or receives data. Actual network speed will vary based on configuration compression network congestion and other factors. The accuracy and timeliness of data received is not guaranteed; delays or omissions may occur.We do not log any user activity (sites visited DNS lookups emails etc.) We only log access attempts to our servers (for security and troubleshooting). We do not get involved in any form of censorship. We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction and the vast majority of these requests would not be from a court of competent jurisdiction. We will protect you to the max and our system is setup to automatically do so. There are hundreds of good reasons for being anonymous and we respect them fully.Hacking cracking distribution of viruses fraudulent activities network sa
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.Terms of ServiceThis is an agreement between you and FastestVPN.com for virtual private network communications services related services and features. It is NOT a service for the commission of criminal acts. It is an anonymity and privacy service. You agree not to violate any laws of any jurisdiction you are originating from or terminating into.You agree to protect your user id/password and our system from unauthorized use. You are responsible for all actions that occur on our servers where the login uses your user id/password.You agree not to use the system for sending spam port scanning scanning for open proxies or open relays sending opt-in email unsolicited email or any type or version of email sent in large quantities even if the email is ultimately sent off of another server. You agree not to launch any pop-ups from our service. You agree not to attack in any way shape or form any other computer or network while on our service.Actual service coverage speeds locations and quality may vary. The Service will attempt to be available at all times except for limited periods for maintenance and repair. However the Service may be subject to unavailability for a variety of factors beyond our control including emergencies third party service failures transmission equipment or network problems or limitations interference signal strength and may be interrupted refused limited or curtailed. We are not responsible for data messages or pages lost not delivered delayed or misdirected because of interruptions or performance issues with the Service or communications services or networks (e.g. T-1 lines or the Internet). We may impose usage or Service limits suspend Service or block certain kinds of usage in our sole discretion to protect users or the Service. Network speed is an estimate and is no indication of the speed at which your or the Service sends or receives data. Actual network speed will vary based on configuration compression network congestion and other factors. The accuracy and timeliness of data received is not guaranteed; delays or omissions may occur.We do not log any user activity (sites visited DNS lookups emails etc.) We only log access attempts to our servers (for security and troubleshooting). We do not get involved in any form of censorship. We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction and the vast majority of these requests would not be from a court of competent jurisdiction. We will protect you to the max and our system is setup to automatically do so. There are hundreds of good reasons for being anonymous and we respect them fully.Hacking cracking distribution of viruses fraudulent activities network sa
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPNJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\unins000.datJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-1SSK8.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-V02LD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-F6R4E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-HC0TS.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-FCV4A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-2448N.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-50CK2.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5L7N2.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-3LDP6.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-59D46.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-CKMSD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-FRGRO.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-BJ8NM.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-PTLVI.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-9ODK7.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-OKMTN.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-QTCOF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-446MI.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-GFG66.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-QNEIM.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-TIP8B.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-NSK8U.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-LFVH5.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-98KKE.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5TM82.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5IUQF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-AHK7Q.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-K9S0M.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-GRQCB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-L8FIT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-4QKGT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-UORP7.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-1RGTV.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-O5MTV.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-IPA77.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-1FT3O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-VTVPL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-05ABD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-EQOPF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-UN9A1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-5EDG5.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-K82F0.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-4EJAE.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-HNNPS.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-RU768.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-21P0F.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-57IGR.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-DTS4U.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\ResourcesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-5M6KM.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-JF6RJ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-J9ANF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-8UK12.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-UCO86.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-O5204.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-EJ1T1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-JCL7T.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-4H11H.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-Q7RHP.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QN5KA.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-BERNA.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-4R4LE.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-TSTOA.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QG142.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-T7NGU.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-9HBCL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-J49VG.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-71J6V.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-BTQQJ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-MI83V.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-9BMN3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-FO4BS.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-7L7U1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-4JUC4.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-SADIQ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-OJSLF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-R9V8V.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-K889R.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-PM9AD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-KHPQG.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-5RDD6.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QLSLT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-71JPL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-1155O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\dataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-HMKT1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-NI40A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-GM9LU.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\data\is-CUGSD.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driverJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\is-SAIVV.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\is-90S23.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windowsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-QA9TR.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-FKPUT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-PG7JG.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-7J76O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-9NM46.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-0UT9M.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-6HO0C.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-VSNQ2.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-O423O.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-PBM2F.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-QN43A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-EQ5BP.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-P6RB9.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-3MVJ1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-DDCD3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-6LAFJ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-ISUTF.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-9C393.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-0IO2E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-922TB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-SPFH5.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-5P6ME.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-GNQS3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-T49GN.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\spJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\is-D3BH1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\is-T3PGP.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driverJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\is-K5R6R.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386\is-HEM9F.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64\is-0G2RR.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386\is-PE3HT.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\releaseJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\release\is-QPO3E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Resources\sp\release\is-1ASBC.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\ServiceJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-IBD4C.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-PTINH.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-84F6J.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-SQ7U6.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-2RVHB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-7I93E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-902P3.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-QVSDK.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-GL2TH.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-AVARB.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-E9VNL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-63I9E.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-J59NL.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-6KC91.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-UI3J1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-OTL5D.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-BI62G.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-17VQ7.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-NF2G1.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-CS1P9.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-9GVKQ.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-JJ40M.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\Service\is-17D7A.tmpJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDirectory created: C:\Program Files\FastestVPN\is-0G40P.tmpJump to behavior
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeDirectory created: C:\Program Files\FastestVPN\Service\InstallUtil.InstallLog
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeDirectory created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeDirectory created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallState
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\FastestVPN_is1Jump to behavior
          Source: PVUfopbGfc.exeStatic PE information: certificate valid
          Source: PVUfopbGfc.exeStatic file information: File size 21250384 > 1048576
          Source: PVUfopbGfc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: Binary string: System.Configuration.Install.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmp
          Source: Binary string: C:\Users\samuli\source\repos\tap-windows6\devcon\x64\Release\devcon.pdb source: tapinstall.exe, 0000000A.00000000.2343669290.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp, tapinstall.exe, 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp, tapinstall.exe, 0000000B.00000000.2345491583.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp, tapinstall.exe, 0000000B.00000002.2394906784.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmp
          Source: Binary string: C:\BuildAgent\work\da2c3d9512902c54\Tooling\obj\Release\System.Web.Cors\System.Web.Cors.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3310997564.0000000004682000.00000002.00000001.01000000.0000004C.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.WindowsService\obj\Release\FastestVPN.WindowsService.pdbe\FastestVPN.WindowsServic source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN\obj\Debug\VPN.pdbB3\3 N3_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3312674428.0000000004752000.00000002.00000001.01000000.0000004E.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.Common\obj\Debug\VPN.Common.pdb source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584576821.0000000005782000.00000002.00000001.01000000.0000000F.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdbSHA256Z source: FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: netsh.exe, 00000032.00000002.2825529110.0000000004E80000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825762645.0000000005320000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857233034.00000000023C9000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857620610.0000000002860000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Cors.pdbSHA256 source: FastestVPN.WindowsService.exe, 0000002F.00000002.3310437304.0000000004662000.00000002.00000001.01000000.00000046.sdmp
          Source: Binary string: E:\nt\dnsrv\sdktools\reskit\content\subinacl\source\obj\i386\subinacl.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, subinacl.exe, subinacl.exe, 0000002B.00000000.2611161261.0000000001001000.00000020.00000001.01000000.00000034.sdmp, subinacl.exe, 0000002B.00000002.2618280142.0000000001001000.00000020.00000001.01000000.00000034.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr
          Source: Binary string: ?&nC:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.pdb# source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Cors.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3310437304.0000000004662000.00000002.00000001.01000000.00000046.sdmp
          Source: Binary string: winmm.pdbUGP source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2856862183.00000000007E7000.00000008.00000001.01000000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.Configuration.Install.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Common\obj\Release\FastestVPN.Common.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3307845165.0000000004522000.00000002.00000001.01000000.00000035.sdmp
          Source: Binary string: Microsoft.Owin.Diagnostics.pdbSHA256 source: FastestVPN.WindowsService.exe, 0000002F.00000002.3311828504.0000000004712000.00000002.00000001.01000000.00000049.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN\obj\Debug\VPN.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3312674428.0000000004752000.00000002.00000001.01000000.0000004E.sdmp
          Source: Binary string: C:\Windows\Microsoft.NET\Framework\v4.0.30319\spNet.SignalR.Core.pdb561934e089\System.dllLISTj! source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000112D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\samuli\source\repos\tap-windows6\src\Release\tap0901.pdb source: is-PBM2F.tmp.1.dr
          Source: Binary string: c:\Users\Junaid AK\Desktop\New folder (2)\SingleInstanceApplication\SingleInstanceApplication\obj\Release\SingleInstanceApplication.pdb source: FastestVPN.exe, 00000034.00000002.2693645936.00000000026F2000.00000002.00000001.01000000.00000012.sdmp
          Source: Binary string: C:\Users\Jason A. Donenfeld\Projects\wireguard-nt\Release\amd64\wireguard.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: Windows\dll\mscorlib.pdbex0 source: FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Hosting.pdbSHA256d"M! source: FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.provider.dynamic_cdecl\obj\Release\netstandard2.0\SQLitePCLRaw.provider.dynamic_cdecl.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.OpenVpn\obj\Debug\VPN.OpenVpn.pdbRhlh ^h_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3312869455.0000000004762000.00000002.00000001.01000000.0000004F.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterAnalytics\Microsoft.AppCenter.Analytics.WindowsDesktop\obj\Microsoft.AppCenter.Analytics.WindowsDesktop\Release\net472\Microsoft.AppCenter.Analytics.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330206330.0000000006392000.00000002.00000001.01000000.0000002B.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: c:\projects\projectsJ\nfsdk2_1.6\bin\release\win32\nfapi.pdb< source: nfregdrv.exe, 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmp, nfregdrv.exe, 0000001A.00000002.2409400563.0000000010019000.00000002.00000001.01000000.0000000A.sdmp
          Source: Binary string: Hardcodet.NotifyIcon.Wpf.pdbSHA256[ source: FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterCrashes\Microsoft.AppCenter.Crashes.WindowsDesktop\obj\Microsoft.AppCenter.Crashes.WindowsDesktop\Release\net472\Microsoft.AppCenter.Crashes.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3330335816.00000000063A2000.00000002.00000001.01000000.0000002C.sdmp
          Source: Binary string: h:\projects\netfilter3\bin\Release\Win32\nfregdrv.pdb )0THi source: nfregdrv.exe, 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 00000019.00000000.2405650366.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000002.2408828115.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000000.2407706394.0000000000408000.00000002.00000001.01000000.00000009.sdmp, is-1ASBC.tmp.1.dr
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdbSHA256x source: FastestVPN.exe, 00000022.00000002.3298315092.000000000108F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3349122671.000000000BC52000.00000002.00000001.01000000.0000002D.sdmp
          Source: Binary string: \??\C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.pdbtral source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdbmDataDriverData=C:\Windows\System32\Drivers\DriverDataOS=Windows_NTPATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64ProgramData=C:\ProgramDataPUBLIC=C:\Users\PublicSystemDrive=C:SystemRoot=C:\Windows~ source: FastestVPN.exe, 00000022.00000002.3341691329.000000000B474000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\host_release\flutter_windows.dll.pdb source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmp
          Source: Binary string: C:\projects\projectsJ\nfsdk2_1.6\driver_wfp\Win8\Win8Release\x64\netfilter2.pdb source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: netsh.exe, 00000032.00000002.2825529110.0000000004E80000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825762645.0000000005320000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857233034.00000000023C9000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857620610.0000000002860000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: h:\projects\netfilter3\bin\Release\Win32\nfregdrv.pdb source: nfregdrv.exe, 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 00000019.00000000.2405650366.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000002.2408828115.0000000000408000.00000002.00000001.01000000.00000009.sdmp, nfregdrv.exe, 0000001A.00000000.2407706394.0000000000408000.00000002.00000001.01000000.00000009.sdmp, is-1ASBC.tmp.1.dr
          Source: Binary string: ntdll.pdbUGP source: ComDebug.exe, 00000030.00000002.2670309064.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669964695.0000025FA44F0000.00000004.00000800.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669735713.0000025FA40F3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: $]qEC:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: winmm.pdb source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2856862183.00000000007E7000.00000008.00000001.01000000.00000000.sdmp
          Source: Binary string: agar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.WindowsService\obj\Release\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: $]q!Microsoft.AspNet.SignalR.Core.pdb`,]q)"<>| source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.Common\obj\Debug\VPN.Common.pdbH source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000002.2584576821.0000000005782000.00000002.00000001.01000000.0000000F.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.WireGuard\obj\Debug\VPN.WireGuard.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3314037370.00000000047B2000.00000002.00000001.01000000.00000051.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Data.Local\obj\Release\FastestVPN.Data.Local.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325295176.0000000005DD2000.00000002.00000001.01000000.0000001D.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection.Abstractions/Release/net462/Microsoft.Extensions.DependencyInjection.Abstractions.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3323696936.0000000005952000.00000002.00000001.01000000.00000015.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.WindowsService\obj\Release\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000000.2412885741.0000000000E22000.00000002.00000001.01000000.0000000B.sdmp, FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: E:\A\_work\89\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netstandard\System.Memory.pdbSHA256HXhZm source: FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmp
          Source: Binary string: Microsoft.Owin.pdbSHA256 source: FastestVPN.WindowsService.exe, 0000002F.00000002.3309349757.0000000004592000.00000002.00000001.01000000.00000038.sdmp
          Source: Binary string: /home/runner/work/Flurl/Flurl/src/Flurl/obj/Release/net472/Flurl.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp
          Source: Binary string: /home/runner/work/Flurl/Flurl/src/Flurl/obj/Release/net472/Flurl.pdbSHA256!VN source: FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp
          Source: Binary string: mscorlib.pdb source: FastestVPN.exe, 00000022.00000002.3298315092.000000000108F000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.RAS\obj\Debug\VPN.RAS.pdb source: PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3313739781.00000000047A2000.00000002.00000001.01000000.00000050.sdmp, is-21P0F.tmp.1.dr
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection.Abstractions/Release/net462/Microsoft.Extensions.DependencyInjection.Abstractions.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3323696936.0000000005952000.00000002.00000001.01000000.00000015.sdmp
          Source: Binary string: C:\Windows\FastestVPN.WindowsService.pdbpdbice.pdb </ source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\projects\wpfanimatedgif\WpfAnimatedGif\obj\Release\net40\WpfAnimatedGif.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3329548380.0000000006312000.00000002.00000001.01000000.00000020.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenter\Microsoft.AppCenter.WindowsDesktop\obj\Microsoft.AppCenter.WindowsDesktop\Release\net472\Microsoft.AppCenter.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.ViewModel\obj\Release\FastestVPN.ViewModel.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmp
          Source: Binary string: Microsoft.Owin.Host.HttpListener.pdbSHA256-( source: FastestVPN.WindowsService.exe, 0000002F.00000002.3309864180.00000000045C2000.00000002.00000001.01000000.0000003A.sdmp
          Source: Binary string: D:\repos\main\SSH2\Release\pdbs\BvUpdateLauncher.pdb source: ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2856630470.00000000003A9000.00000002.00000001.01000000.00000057.sdmp, Launcher.exe, 00000035.00000000.2781267206.00000000003A8000.00000002.00000001.01000000.00000057.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Security.pdbSHA256U source: FastestVPN.WindowsService.exe, 0000002F.00000002.3311384386.0000000004692000.00000002.00000001.01000000.0000004A.sdmp, is-63I9E.tmp.1.dr
          Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\arm64\driver\wireguard.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Data.Remote\obj\Release\FastestVPN.Data.Remote.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.BLL\obj\Release\FastestVPN.BLL.pdbVepe be_CorDllMainmscoree.dll source: FastestVPN.exe, 00000022.00000002.3325176110.0000000005DC2000.00000002.00000001.01000000.0000001C.sdmp
          Source: Binary string: symbols\exe\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: /_/src/Flurl.Http/obj/Release/net472/Flurl.Http.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.OpenVpn\obj\Debug\VPN.OpenVpn.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3312869455.0000000004762000.00000002.00000001.01000000.0000004F.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Bcl.AsyncInterfaces/Release/net462/Microsoft.Bcl.AsyncInterfaces.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3324194724.0000000005D02000.00000002.00000001.01000000.00000016.sdmp
          Source: Binary string: BouncyCastle.Crypto.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3354869052.000000000DFF2000.00000002.00000001.01000000.00000036.sdmp
          Source: Binary string: Microsoft.Owin.Diagnostics.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3311828504.0000000004712000.00000002.00000001.01000000.00000049.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\arm64\driver\wireguard.pdbGCTL source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: System.ServiceProcess.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\FastestVPN.WindowsService.pdbL source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection/Release/net462/Microsoft.Extensions.DependencyInjection.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3324336785.0000000005D12000.00000002.00000001.01000000.00000017.sdmp
          Source: Binary string: System.Configuration.Install.pdbxF source: FastestVPN.WindowsService.exe, 0000001D.00000002.2583865767.0000000003286000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.WireGuard\obj\Debug\VPN.WireGuard.pdb2;L; >;_CorDllMainmscoree.dll source: FastestVPN.WindowsService.exe, 0000002F.00000002.3314037370.00000000047B2000.00000002.00000001.01000000.00000051.sdmp
          Source: Binary string: E:\nt\dnsrv\sdktools\reskit\content\subinacl\source\obj\i386\subinacl.pdbPa source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, subinacl.exe, 0000002B.00000000.2611161261.0000000001001000.00000020.00000001.01000000.00000034.sdmp, subinacl.exe, 0000002B.00000002.2618280142.0000000001001000.00000020.00000001.01000000.00000034.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr
          Source: Binary string: C:\projects\projectsJ\nfsdk2_1.6\driver_wfp\Win8\Win8Release\x64\netfilter2.pdb source: xcopy.exe, 00000018.00000003.2403159655.00000297A19EA000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterAnalytics\Microsoft.AppCenter.Analytics.WindowsDesktop\obj\Microsoft.AppCenter.Analytics.WindowsDesktop\Release\net472\Microsoft.AppCenter.Analytics.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3330206330.0000000006392000.00000002.00000001.01000000.0000002B.sdmp
          Source: Binary string: E:\A\_work\156\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Threading.Tasks.Extensions\netfx\System.Threading.Tasks.Extensions.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324622795.0000000005D32000.00000002.00000001.01000000.00000018.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Diagnostics\obj\Release\FastestVPN.Diagnostics.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324712420.0000000005D42000.00000002.00000001.01000000.00000019.sdmp
          Source: Binary string: C:\Users\Jason A. Donenfeld\Projects\wireguard-nt\Release\arm64\setupapihost.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: c:\projects\projectsJ\nfsdk2_1.6\bin\release\win32\nfapi.pdb source: nfregdrv.exe, 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmp, nfregdrv.exe, 0000001A.00000002.2409400563.0000000010019000.00000002.00000001.01000000.0000000A.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Bcl.AsyncInterfaces/Release/net462/Microsoft.Bcl.AsyncInterfaces.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324194724.0000000005D02000.00000002.00000001.01000000.00000016.sdmp
          Source: Binary string: c:\Users\lodejard\Projects\owin-hosting\src\main\Owin.Startup\obj\Release\Owin.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3307242028.0000000004242000.00000002.00000001.01000000.00000039.sdmp
          Source: Binary string: Microsoft.Owin.Hosting.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.DependencyInjection\obj\Release\FastestVPN.DI.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3323485610.0000000005842000.00000002.00000001.01000000.00000014.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenterCrashes\Microsoft.AppCenter.Crashes.WindowsDesktop\obj\Microsoft.AppCenter.Crashes.WindowsDesktop\Release\net472\Microsoft.AppCenter.Crashes.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3330335816.00000000063A2000.00000002.00000001.01000000.0000002C.sdmp
          Source: Binary string: nTC:\Windows\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.Extensions.DependencyInjection/Release/net462/Microsoft.Extensions.DependencyInjection.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324336785.0000000005D12000.00000002.00000001.01000000.00000017.sdmp
          Source: Binary string: @&n.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2581965322.0000000000FB9000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: c:\Users\Junaid AK\Desktop\New folder (2)\SingleInstanceApplication\SingleInstanceApplication\obj\Release\SingleInstanceApplication.pdb@:^: P:_CorDllMainmscoree.dll source: FastestVPN.exe, 00000034.00000002.2693645936.00000000026F2000.00000002.00000001.01000000.00000012.sdmp
          Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.dr
          Source: Binary string: E:\A\_work\89\s\corefx\bin\obj\AnyOS.AnyCPU.Release\System.Memory\netstandard\System.Memory.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmp
          Source: Binary string: C:\projects\wpfanimatedgif\WpfAnimatedGif\obj\Release\net40\WpfAnimatedGif.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3329548380.0000000006312000.00000002.00000001.01000000.00000020.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.BLL\obj\Release\FastestVPN.BLL.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325176110.0000000005DC2000.00000002.00000001.01000000.0000001C.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.bundle_green\obj\Release\net461\SQLitePCLRaw.batteries_v2.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3298315092.000000000108F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3349122671.000000000BC52000.00000002.00000001.01000000.0000002D.sdmp
          Source: Binary string: Microsoft.Owin.Security.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3311384386.0000000004692000.00000002.00000001.01000000.0000004A.sdmp, is-63I9E.tmp.1.dr
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Common\obj\Release\FastestVPN.Common.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3307845165.0000000004522000.00000002.00000001.01000000.00000035.sdmp
          Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3314344281.0000000004802000.00000002.00000001.01000000.0000004B.sdmp, is-K9S0M.tmp.1.dr
          Source: Binary string: \??\C:\Windows\Microsoft.AspNet.SignalR.Core.pdbTV source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.00000000011D3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: n0C:\Windows\mscorlib.pdb source: FastestVPN.exe, 00000022.00000002.3330592068.00000000065A8000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceProcess.pdblez source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: D:\VPN core\FastestVPN-Windows-Core\VPN.AdvancedNetwork\obj\Debug\VPN.AdvancedNetwork.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3312448340.0000000004742000.00000002.00000001.01000000.0000004D.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN\obj\Release\FastestVPN.pdb source: FastestVPN.exe, 00000022.00000000.2464852704.0000000000ABD000.00000002.00000001.01000000.00000011.sdmp
          Source: Binary string: \??\C:\Windows\exe\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.Configuration.Install.pdbpdball.pdb> source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: /_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb@\]q^/_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: Microsoft.Owin.Host.HttpListener.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3309864180.00000000045C2000.00000002.00000001.01000000.0000003A.sdmp
          Source: Binary string: $]q^/_/artifacts/obj/Microsoft.AspNet.SignalR.Core/Release/net45/Microsoft.AspNet.SignalR.Core.pdb source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\amd64\driver\wireguard.pdbGCTL source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: D:\a\1\s\SDK\AppCenter\Microsoft.AppCenter.WindowsDesktop\obj\Microsoft.AppCenter.WindowsDesktop\Release\net472\Microsoft.AppCenter.pdbSHA256 source: FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.Data.Remote\obj\Release\FastestVPN.Data.Remote.pdbb^|^ n^_CorDllMainmscoree.dll source: FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmp
          Source: Binary string: D:\Sagar Work FastestVPN\FastestVPN-Windows-App\FastestVPN.DependencyInjection\obj\Release\FastestVPN.DI.pdbY6s6 e6_CorDllMainmscoree.dll source: FastestVPN.exe, 00000022.00000002.3323485610.0000000005842000.00000002.00000001.01000000.00000014.sdmp
          Source: Binary string: \??\C:\Windows\exe\FastestVPN.WindowsService.pdb3 source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\samuli\source\repos\tap-windows6\src\x64\Release\tap0901.pdb source: drvinst.exe, 0000000D.00000003.2367445197.000001E102C35000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.2365465099.000001E102B8C000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 0000000D.00000003.2367245171.000001E102C34000.00000004.00000020.00020000.00000000.sdmp, is-7J76O.tmp.1.dr, SET9DE9.tmp.14.dr
          Source: Binary string: ntdll.pdb source: ComDebug.exe, 00000030.00000002.2670309064.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669964695.0000025FA44F0000.00000004.00000800.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669735713.0000025FA40F3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: /_/src/Flurl.Http/obj/Release/net472/Flurl.Http.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmp
          Source: Binary string: D:\a\SQLitePCL.raw\SQLitePCL.raw\SQLitePCL.raw\src\SQLitePCLRaw.core\obj\Release\netstandard2.0\SQLitePCLRaw.core.pdbSHA256Ci\ source: FastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmp
          Source: Binary string: Microsoft.Owin.pdb source: FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000002F.00000002.3309349757.0000000004592000.00000002.00000001.01000000.00000038.sdmp
          Source: Binary string: BouncyCastle.Crypto.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3354869052.000000000DFF2000.00000002.00000001.01000000.00000036.sdmp
          Source: Binary string: D:\nt-driver-builder\wireguard-nt-0.10\Release\amd64\driver\wireguard.pdb source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.pdb source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: Hardcodet.NotifyIcon.Wpf.pdb source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmp
          Source: Binary string: \??\C:\Windows\FastestVPN.WindowsService.pdbdb] source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\FastestVPN.WindowsService.pdb00 source: FastestVPN.WindowsService.exe, 0000001D.00000002.2582155531.00000000012F2000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID
          Source: is-HC0TS.tmp.1.drStatic PE information: 0xAB462008 [Fri Jan 21 02:20:56 2061 UTC]
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E6C90 SetupOpenInfFileW,GetLastError,SetupFindFirstLineW,SetupGetStringFieldW,SetupFindFirstLineW,SetupGetStringFieldW,CLSIDFromString,SetupDiGetClassDescriptionExW,LoadLibraryW,GetProcAddress,GetLastError,GetLastError,SetupFindFirstLineW,SetupGetStringFieldW,SetupGetStringFieldW,SetupCloseInfFile,FreeLibrary,10_2_00007FF70A9E6C90
          Source: PVUfopbGfc.exeStatic PE information: section name: .didata
          Source: PVUfopbGfc.tmp.0.drStatic PE information: section name: .didata
          Source: is-ISUTF.tmp.1.drStatic PE information: section name: _RDATA
          Source: is-1SSK8.tmp.1.drStatic PE information: section name: .didata
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2C52C push rsp; retn 0004h10_2_00007FF70AA2C52D
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA2C576 push rsi; ret 10_2_00007FF70AA2C579
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_004028FD push ecx; ret 25_2_00402910
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_1000A089 push ecx; ret 25_2_1000A09C
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_057858C0 push ds; retf 29_2_057858D0
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_05785547 push cs; retf 29_2_05785552
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_05785739 push ss; retf 29_2_0578573E
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_05785530 push cs; retf 29_2_05785546
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_057858B1 push ds; retf 29_2_057858B2
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_05785734 push ss; retf 29_2_05785738
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_057858B4 push ds; retf 29_2_057858B8
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_05785529 push cs; retf 29_2_0578552E
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_05785729 push ss; retf 29_2_0578572C
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_0578572F push ss; retf 29_2_05785732
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_057854A6 push cs; retf 29_2_05785546
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeCode function: 29_2_0578569F push ss; retf 29_2_0578573E
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0595435D push es; retf 34_2_0595437E
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0595437F push es; retf 34_2_0595445C
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D179DF push es; retf 34_2_05D17A7E
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1ADC0 push cs; ret 34_2_05D1AE10
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D182C7 push ss; ret 34_2_05D182CA
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1AEF2 push cs; retf 34_2_05D1AEF6
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1AF10 push cs; retf 34_2_05D1AF1A
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1AF04 push cs; retf 34_2_05D1AF0E
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D1AD3F push cs; ret 34_2_05D1ADBC
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D73564 push es; ret 34_2_05D73585
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_05D72FE2 push es; ret 34_2_05D73585
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_063A5883 push cs; ret 34_2_063A58CC
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BE74DF4 push cs; retf 34_2_0BE74E1A
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BE75C46 push cs; ret 34_2_0BE75C9A
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_0BE75BD5 push cs; ret 34_2_0BE75C9A
          Source: is-FRGRO.tmp.1.drStatic PE information: section name: .text entropy: 7.662424467871785

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
          Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
          Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
          Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-UI3J1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-7I93E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-4JUC4.tmpJump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-JJ40M.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\window_size_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-PTINH.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.Abstractions.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-1RGTV.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\file_selector_windows_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\libssl-1_1-x64.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\iphelperclose.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.AppCenter.Crashes.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\flutter_windows.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-4QKGT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\iphelperclose.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\flutter_gpu_texture_renderer_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-TSTOA.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Hosting.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\nfapi.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-1155O.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-71JPL.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeFile created: C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\tap0901.sys (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\window_manager_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\subinacl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\libssl32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-F6R4E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\unins000.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-FCV4A.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\openvpnserv.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-IBD4C.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.Data.Remote.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\openssl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\SQLitePCLRaw.batteries_v2.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\release\nfapi.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-7L7U1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-QNEIM.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-K82F0.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-J9ANF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.AppCenter.Analytics.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\subinacl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-QN5KA.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\desktop_multi_window_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-EQOPF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\liblzo2-2.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\System.Threading.Tasks.Extensions.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\System.Memory.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\desktop_drop_plugin.dllJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\url_launcher_windows_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64\is-0G2RR.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\ComDebug.exe (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\texture_rgba_renderer_plugin.dllJump to dropped file
          Source: C:\Windows\SysWOW64\netsh.exeFile created: C:\Users\user\AppData\Local\Temp\dglbpgJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-HNNPS.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-TIP8B.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-17D7A.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-O5MTV.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-QTCOF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-GFG66.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-5RDD6.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-E9VNL.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-DTS4U.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-1FT3O.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-ISUTF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-59D46.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\VPN.RAS.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\BouncyCastle.Crypto.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.AspNet.SignalR.Client.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-QVSDK.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.BLL.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-1SSK8.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\fix-dns-leak-32.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\uni_links_desktop_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\vcruntime140.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Diagnostics.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\openvpn.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\VPN.RAS.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.AppCenter.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\is-K5R6R.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\VPN.OpenVpn.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Flurl.Http.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Newtonsoft.Json.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Security.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-5M6KM.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-OKMTN.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.ViewModel.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\texture_rgba_renderer_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-RU768.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-T7NGU.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-MI83V.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Newtonsoft.Json.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\VPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\fix-dns-leak-32.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\flutter_custom_cursor_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-902P3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\VPN.WireGuard.dll (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-21P0F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\window_manager_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Updater.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\SQLitePCLRaw.core.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-FRGRO.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Cors.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-9GVKQ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Hardcodet.NotifyIcon.Wpf.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\tapinstallWin64.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\VPN.AdvancedNetwork.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\flutter_custom_cursor_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-BI62G.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-QG142.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-J59NL.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-EJ1T1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\VPN.AdvancedNetwork.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Owin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-QN43A.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\uni_links_desktop_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\wireguard.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-AVARB.tmpJump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\SET98BB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.Owin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-GNQS3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-4R4LE.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.Data.Local.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Flurl.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-71J6V.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\System.Buffers.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-17VQ7.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\VPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-7J76O.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-L8FIT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-5P6ME.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\flutter_windows.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\SingleInstanceApplication.dll (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\SET9DE9.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-CS1P9.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\System.Web.Cors.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\flutter_gpu_texture_renderer_plugin.dllJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeFile created: C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\SET9466.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-57IGR.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-98KKE.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-6KC91.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\ssleay32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-O5204.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\nfapi.dll (copy)Jump to dropped file
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeFile created: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-QLSLT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-GRQCB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\devcon.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-NSK8U.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-UN9A1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-5IUQF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\openvpnserv2.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Users\user\AppData\Local\Temp\is-8EE2F.tmp\_isetup\_setup64.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-K889R.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\VPN.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\release\is-1ASBC.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-63I9E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-8UK12.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\desktop_drop_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\VPN.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\tapctl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-UORP7.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\SQLitePCLRaw.provider.dynamic_cdecl.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-V02LD.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.Bcl.AsyncInterfaces.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-FO4BS.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-KHPQG.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-BTQQJ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-VTVPL.tmpJump to dropped file
          Source: C:\Windows\System32\xcopy.exeFile created: C:\Windows\System32\drivers\fastestvpndriver.sysJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-6LAFJ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-4EJAE.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-Q7RHP.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-9BMN3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-LFVH5.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-PBM2F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386\is-HEM9F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-HC0TS.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-J49VG.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\msvcr100.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\WpfAnimatedGif.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-OTL5D.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\screen_retriever_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\i386\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\VPN.OpenVpn.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\libeay32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\libcrypto-1_1-x64.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-OJSLF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Host.HttpListener.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\libpkcs11-helper-1.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\desktop_multi_window_plugin.dll (copy)Jump to dropped file
          Source: C:\Windows\SysWOW64\netsh.exeFile created: C:\Users\user\AppData\Local\Temp\Launcher.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\FastestVPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-446MI.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-NF2G1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-9HBCL.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-K9S0M.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-GL2TH.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\tapinstallWin32.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-5L7N2.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-BERNA.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-9NM46.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-IPA77.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\url_launcher_windows_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.Diagnostics.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-5TM82.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-JF6RJ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-SADIQ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\window_size_plugin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\release\is-QPO3E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386\is-PE3HT.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\file_selector_windows_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-2RVHB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\System.Numerics.Vectors.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeFile created: C:\Users\user\AppData\Roaming\linkinfo\screen_retriever_plugin.dllJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-2448N.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-PTLVI.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-AHK7Q.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\VPN.WireGuard.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\is-UCO86.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Service\is-SQ7U6.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\System.Runtime.CompilerServices.Unsafe.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\is-05ABD.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Program Files\FastestVPN\FastestVPN.DI.dll (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\tap0901.sys (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\tap0901.sys (copy)Jump to dropped file
          Source: C:\Windows\System32\xcopy.exeFile created: C:\Windows\System32\drivers\fastestvpndriver.sysJump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\drivers\SET9DE9.tmpJump to dropped file
          Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\SET98BB.tmpJump to dropped file
          Source: C:\Windows\SysWOW64\netsh.exeFile created: C:\Users\user\AppData\Local\Temp\dglbpgJump to dropped file
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeFile created: C:\Program Files\FastestVPN\Service\InstallUtil.InstallLog
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeFile created: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FastestVPN.lnkJump to behavior
          Source: C:\Windows\System32\drvinst.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tap0901Jump to behavior
          Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\LinkageJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastestVPNJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastestVPN\FastestVPN.lnkJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastestVPN\Uninstall FastestVPN.lnkJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FastestVPN.lnkJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10013540 OpenSCManagerA,CreateServiceW,CloseServiceHandle,GetLastError,GetLastError,OpenServiceA,QueryServiceStatus,StartServiceA,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetLastError,25_2_10013540
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop fastestvpndriver

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\netsh.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\DGLBPG
          Source: C:\Program Files\FastestVPN\FastestVPN.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
          Source: C:\Program Files\FastestVPN\FastestVPN.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 Blob
          Source: C:\Users\user\Desktop\PVUfopbGfc.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\subinacl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\subinacl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" Jump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 764A3B97
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeAPI/Special instruction interceptor: Address: 3A4ACF
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 1750000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 3200000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 2F70000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMemory allocated: 2C20000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMemory allocated: 2EB0000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMemory allocated: 2C20000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: A60000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 2780000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: D50000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 19B0000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 1B70000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: 3B70000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMemory allocated: C80000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMemory allocated: 2740000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\FastestVPN.exeMemory allocated: 4740000 memory reserve | memory write watch
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E4820 SetupDiGetDeviceRegistryPropertyW,GetLastError,SetupDiGetDeviceRegistryPropertyW,10_2_00007FF70A9E4820
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeWindow / User API: threadDelayed 4293
          Source: C:\Program Files\FastestVPN\FastestVPN.exeWindow / User API: threadDelayed 3927
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2642
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1589
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeWindow / User API: threadDelayed 533
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-UI3J1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-7I93E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-4JUC4.tmpJump to dropped file
          Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-JJ40M.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.Abstractions.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-1RGTV.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\libssl-1_1-x64.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\iphelperclose.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-4QKGT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\iphelperclose.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-TSTOA.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Hosting.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-1155O.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-71JPL.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\libssl32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\unins000.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-F6R4E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\openvpnserv.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-FCV4A.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-IBD4C.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.Data.Remote.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\openssl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\SQLitePCLRaw.batteries_v2.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-7L7U1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-QNEIM.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-K82F0.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-J9ANF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Microsoft.AppCenter.Analytics.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\subinacl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-QN5KA.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-EQOPF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\liblzo2-2.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\System.Threading.Tasks.Extensions.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\System.Memory.dll (copy)Jump to dropped file
          Source: C:\Windows\SysWOW64\netsh.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\dglbpgJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64\is-0G2RR.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-HNNPS.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-17D7A.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-TIP8B.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-QTCOF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-GFG66.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-5RDD6.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-DTS4U.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-E9VNL.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-1FT3O.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\VPN.RAS.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-59D46.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Microsoft.AspNet.SignalR.Client.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\BouncyCastle.Crypto.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-QVSDK.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.BLL.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\fix-dns-leak-32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-1SSK8.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Diagnostics.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\vcruntime140.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\openvpn.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\VPN.RAS.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Microsoft.AppCenter.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\is-K5R6R.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\VPN.OpenVpn.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\amd64\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Flurl.Http.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Newtonsoft.Json.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Security.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-OKMTN.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.ViewModel.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-RU768.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-T7NGU.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-MI83V.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Newtonsoft.Json.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\VPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\fix-dns-leak-32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-902P3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\VPN.WireGuard.dll (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\drivers\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-21P0F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Updater.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\SQLitePCLRaw.core.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Cors.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Hardcodet.NotifyIcon.Wpf.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-9GVKQ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\tapinstallWin64.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\VPN.AdvancedNetwork.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-BI62G.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-QG142.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-J59NL.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-EJ1T1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\VPN.AdvancedNetwork.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Owin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-QN43A.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\wireguard.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-AVARB.tmpJump to dropped file
          Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\SET98BB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.Owin.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.Data.Local.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-4R4LE.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-GNQS3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-71J6V.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Flurl.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\System.Buffers.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-17VQ7.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\VPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-7J76O.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-L8FIT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-5P6ME.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\SingleInstanceApplication.dll (copy)Jump to dropped file
          Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\drivers\SET9DE9.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\System.Web.Cors.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-CS1P9.tmpJump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\SET9466.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-57IGR.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-98KKE.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-6KC91.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\ssleay32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-O5204.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-QLSLT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-GRQCB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\i386\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\devcon.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-NSK8U.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-UN9A1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\openvpnserv2.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-5IUQF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-8EE2F.tmp\_isetup\_setup64.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-K889R.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\VPN.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-63I9E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\VPN.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-8UK12.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\tapctl.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-UORP7.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\SQLitePCLRaw.provider.dynamic_cdecl.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tap0901.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-V02LD.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-FO4BS.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-KHPQG.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-BTQQJ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-VTVPL.tmpJump to dropped file
          Source: C:\Windows\System32\xcopy.exeDropped PE file which has not been started: C:\Windows\System32\drivers\fastestvpndriver.sysJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-6LAFJ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-4EJAE.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-Q7RHP.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-9BMN3.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-PBM2F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-LFVH5.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386\is-HEM9F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-HC0TS.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-J49VG.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\msvcr100.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\WpfAnimatedGif.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-OTL5D.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\VPN.OpenVpn.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\i386\tapinstall.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\libeay32.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\libcrypto-1_1-x64.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-OJSLF.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Host.HttpListener.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\libpkcs11-helper-1.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\FastestVPN.Common.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-446MI.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-NF2G1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-9HBCL.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-K9S0M.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-GL2TH.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\tapinstallWin32.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-5L7N2.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-BERNA.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-9NM46.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-IPA77.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.Diagnostics.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-5TM82.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-JF6RJ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-SADIQ.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\release\is-QPO3E.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows8\i386\is-PE3HT.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\System.Numerics.Vectors.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-2RVHB.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-2448N.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-PTLVI.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-AHK7Q.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\VPN.WireGuard.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\is-UCO86.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Service\is-SQ7U6.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\System.Runtime.CompilerServices.Unsafe.dll (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\Resources\sp\driver\windows7\i386\fastestvpndriver.sys (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\is-05ABD.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpDropped PE file which has not been started: C:\Program Files\FastestVPN\FastestVPN.DI.dll (copy)Jump to dropped file
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeAPI coverage: 5.8 %
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeAPI coverage: 3.4 %
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 4952Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 1680Thread sleep time: -30000s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -9223372036854770s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -100000s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99889s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99781s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99665s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99555s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99450s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99296s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -99175s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98983s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98873s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98760s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98655s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98538s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98423s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98299s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98134s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -98030s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -97917s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -97813s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -97696s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -97582s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -97409s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 6108Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1440Thread sleep count: 2642 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3224Thread sleep count: 1589 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2352Thread sleep time: -3689348814741908s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3160Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5600Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\svchost.exe TID: 4708Thread sleep time: -30000s >= -30000s
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe TID: 6220Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe TID: 6308Thread sleep count: 533 > 30
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exe TID: 6696Thread sleep time: -180000s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 3500Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files\FastestVPN\FastestVPN.exe TID: 5648Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
          Source: C:\Program Files\FastestVPN\FastestVPN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Program Files\FastestVPN\FastestVPN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Program Files\FastestVPN\FastestVPN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Program Files\FastestVPN\FastestVPN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystemProduct
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1ECAC FindFirstFileExW,FindNextFileW,FindClose,10_2_00007FF70AA1ECAC
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E0B0 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,10_2_00007FF70AA1E0B0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E810 FindFirstFileExW,10_2_00007FF70AA1E810
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA1E0B0 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,10_2_00007FF70AA1E0B0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E3630 GetWindowsDirectoryW,FindFirstFileW,FindNextFileW,FindClose,10_2_00007FF70A9E3630
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_0103172D __EH_prolog,#540,#922,#858,#800,#2910,wcslen,#2910,wcslen,#823,GetLastError,_CxxThrowException,#2910,#2910,swprintf,FindFirstFileW,GetLastError,#825,#2910,FindFirstFileW,wcscmp,wcscmp,wcscmp,#535,#942,#942,#535,#942,#942,#800,FindNextFileW,FindClose,#800,43_2_0103172D
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_01031DDF __EH_prolog,#540,#925,#858,#800,#2910,wcslen,wcslen,#2910,wcslen,#823,GetLastError,_CxxThrowException,#2910,#2910,swprintf,FindFirstFileW,GetLastError,#825,#2910,FindFirstFileW,wcscmp,wcscmp,#540,#538,#922,#925,#858,#800,#800,#800,#925,#800,#858,#800,FindNextFileW,FindClose,#800,43_2_01031DDF
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100163B0 GetLogicalDriveStringsW,QueryDosDeviceW,GetDriveTypeW,EnterCriticalSection,LeaveCriticalSection,25_2_100163B0
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100013F0 ResetEvent,GetSystemInfo,25_2_100013F0
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 100000
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99889
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99781
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99665
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99555
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99450
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99296
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 99175
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98983
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98873
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98760
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98655
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98538
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98423
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98299
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98134
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 98030
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 97917
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 97813
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 97696
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 97582
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 97409
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files\FastestVPN\FastestVPN.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\windows10\Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile opened: C:\Program Files\FastestVPN\Resources\driver\Jump to behavior
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpBinary or memory string: (IsLinux() && isVMWare) || (IsAndroid() && isNvidia) || (IsAndroid() && GetAndroidSdkLevel() < 27 && IsAdreno5xxOrOlder(functions)) || (!isMesa && IsMaliT8xxOrOlder(functions)) || (!isMesa && IsMaliG31OrOlder(functions))
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpBinary or memory string: VMware
          Source: Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
          Source: powershell.exe, 00000023.00000002.2503961408.0000000007BEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
          Source: svchost.exe, 0000000F.00000003.2383709965.000001885FB1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &@vmnetextension
          Source: powershell.exe, 00000023.00000002.2503961408.0000000007BEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stringComputer System ProductComputer System ProductAPPD4C2ED92742-89DC-DD72-92E8-869FA5A66493VMware, Inc.None3
          Source: Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
          Source: svchost.exe, 00000021.00000003.2485264687.000001975150D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTcpV6VMWare
          Source: svchost.exe, 00000021.00000002.3301375524.00000197506D3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2448782040.00000197506DB000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3298315092.0000000001003000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.exe, 00000022.00000002.3344745212.000000000B5B6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000026.00000002.3301534007.000001A803E2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000026.00000002.3304511993.000001A809454000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
          Source: Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
          Source: Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
          Source: powershell.exe, 00000023.00000002.2503961408.0000000007BEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3298560141.000000000116F000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2824601095.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpBinary or memory string: zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd
          Source: Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
          Source: svchost.exe, 0000000F.00000003.2383709965.000001885FB1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@vmnetextension
          Source: powershell.exe, 00000023.00000002.2503961408.0000000007BEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stringComputer System ProductComputer System ProductAPPD4C2ED92742-89DC-DD72-92E8-869FA5A66493VMware, Inc.Noney*
          Source: FastestVPN.exe, 00000034.00000002.2685362791.0000000000959000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
          Source: svchost.exe, 0000000F.00000003.2384910165.000001885FB17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @ethernetwlanppipvmnetextension4E}
          Source: ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpBinary or memory string: IIBroadcomGoogleMesaMicrosoftSamsung Electronics Co., Ltd.VivanteVMwareVirtIOTest
          Source: powershell.exe, 00000023.00000002.2503961408.0000000007BEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stem ProductAPPD4C2ED92742-89DC-DD72-92E8-869FA5A66493VMware, Inc.Noney*
          Source: svchost.exe, 0000000F.00000003.2384538883.000001885FB38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @vmnetextension
          Source: svchost.exe, 00000021.00000003.2570948235.000001975063E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300551301.000001975063E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`nP
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpProcess information queried: ProcessInformationJump to behavior
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess queried: DebugPort
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeProcess queried: DebugPort
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA16788 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF70AA16788
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E6C90 SetupOpenInfFileW,GetLastError,SetupFindFirstLineW,SetupGetStringFieldW,SetupFindFirstLineW,SetupGetStringFieldW,CLSIDFromString,SetupDiGetClassDescriptionExW,LoadLibraryW,GetProcAddress,GetLastError,GetLastError,SetupFindFirstLineW,SetupGetStringFieldW,SetupGetStringFieldW,SetupCloseInfFile,FreeLibrary,10_2_00007FF70A9E6C90
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA257E0 GetProcessHeap,10_2_00007FF70AA257E0
          Source: C:\Program Files\FastestVPN\subinacl.exeProcess token adjusted: Debug
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E8738 SetUnhandledExceptionFilter,10_2_00007FF70A9E8738
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA16788 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF70AA16788
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E8550 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF70A9E8550
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E7B18 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF70A9E7B18
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_004054F3 _raise,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_004054F3
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_0040148B SetUnhandledExceptionFilter,25_2_0040148B
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_0040134A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_0040134A
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_00402D4D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00402D4D
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100081EF _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_100081EF
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_1000B228 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_1000B228
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10007CCF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_10007CCF
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_0103DEE7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,43_2_0103DEE7
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtProtectVirtualMemory: Direct from: 0x100000
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeNtQuerySystemInformation: Direct from: 0x272B020
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtCreateNamedPipeFile: Direct from: 0x7FF8C88ED570
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeNtCreateFile: Direct from: 0x3A4E59
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeNtCreateMutant: Direct from: 0x3A530F
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtAllocateVirtualMemory: Direct from: 0x25FA1E01860
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtProtectVirtualMemory: Direct from: 0x7FF8C88A26A1
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtAllocateVirtualMemory: Direct from: 0x7FF810010011
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtProtectVirtualMemory: Direct from: 0x7FF8C6F50000
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtCreateFile: Direct from: 0x7FF8C7A18E1C
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtQueryValueKey: Direct from: 0x7FF800000061
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeNtAllocateVirtualMemory: Direct from: 0x3A5D8C
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtAllocateVirtualMemory: Direct from: 0x7FF8C7A135E7
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtReadFile: Direct from: 0x7FF8C7A185FB
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtQueryAttributesFile: Direct from: 0x7FF8C7A1540E
          Source: C:\Users\user\AppData\Local\Temp\Launcher.exeNtQuerySystemInformation: Direct from: 0x76EE7B2E
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtQuerySystemInformation: Direct from: 0xC82BF6DE59
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtProtectVirtualMemory: Direct from: 0x25FA1E026CC
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtClose: Direct from: 0x7FF8C7A18E74
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtWriteFile: Direct from: 0x7FF8C7A18E52
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtCreateFile: Direct from: 0x7FF8C7A185AD
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtCreateFile: Direct from: 0xC82BF6DDE8
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtQuerySystemInformation: Direct from: 0x25F00000000
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeNtProtectVirtualMemory: Direct from: 0x7FF8C6F74B60
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: benchillppwo.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: publicitttyps.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: answerrsdo.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: radiationnopp.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: affecthorsedpo.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: bargainnykwo.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: bannngwko.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: bouncedgowp.shop
          Source: netsh.exe, 00000032.00000002.2825340131.00000000047B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: scatterdshsadyi.shop
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeSection loaded: NULL target: C:\Windows\SysWOW64\netsh.exe protection: read write
          Source: C:\Windows\SysWOW64\netsh.exeMemory written: C:\Users\user\AppData\Local\Temp\Launcher.exe base: 3A2178
          Source: C:\Windows\SysWOW64\netsh.exeMemory written: C:\Users\user\AppData\Local\Temp\Launcher.exe base: 531008
          Source: C:\Windows\SysWOW64\netsh.exeMemory written: C:\Users\user\AppData\Local\Temp\Launcher.exe base: 790000
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_010383F6 __EH_prolog,#540,#538,#540,#540,#538,#2910,#861,#4197,#2755,#2910,#800,#800,#800,#800,#800,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#4124,#858,#800,#2910,#2910,#2910,#2755,#4272,#858,#800,#4197,#6563,#2910,#2755,#4272,#858,#800,#4197,#6563,#2910,#2755,#4272,#858,#800,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2756,#2910,swscanf,#2910,#2910,#2910,#2910,#2755,#4272,#858,#800,#825,#4199,#2910,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetLastError,GetSecurityDescriptorLength,#823,GetLastError,#2910,#2910,LocalFree,LocalFree,GetLastError,#2910,#2910,#2910,#2755,#4272,#858,#800,#2910,_wtoi,#2910,#2755,#4272,#858,#800,#858,GetLastError,#2910,#2910,#2910,#2910,#2910,#2755,#4272,#858,#800,#6278,#6279,wcscmp,#2910,swscanf,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2910,#2755,#4272,#858,#800,#540,#540,#2755,#858,#861,#4272,#858,#800,#4124,#858,#800,#2910,wcscmp,#2910,#2910,LogonUserW,GetLastError,#2910,#2910,#800,#800,#800,#800,#2910,#2755,#4272,#858,#800,#858,#861,#861,GetLastError,#2910,#2910,#2910,#2755,#4272,#858,#800,#2755,#538,#4272,#858,#800,#4124,#858,#800,#2910,#2910,#858,GetLastError,#2910,#2910,#2910,#2755,#4272,#858,#800,#2755,#4272,#4124,#858,#800,#4197,#2910,#2910,#2910,#2910,#2910,#800,#537,#800,GetComputerNameW,#861,#927,#858,#800,#538,#922,#800,#800,#2910,#2910,#2910,#2910,#800,#2910,wcsncpy,#861,#861,#800,#2910,#2910,#2910,#2755,#4272,#858,#800,#2756,#2756,#2756,#2756,#2910,#2755,#4272,#858,#800,#5679,#861,#4273,#858,#800,#858,#941,#2910,#2755,#4272,#858,#800,#538,#925,#800,#2910,#2755,#4272,#858,#800,#2755,#4124,#858,#800,#4272,#858,#800,#2755,#540,#4272,#858,#800,#4124,#858,#800,#2756,#2756,#4124,#858,#800,#2910,#2910,wcscmp,GetComputerNameW,#861,#927,#858,#800,#538,#922,#800,#800,#2910,#2910,#2910,#2910,#2910,#800,#800,GetLastError,#2910,#2910,#2910,wcsncpy,wcsncpy,#2910,wcsncpy,#800,#800,#2755,#4272,#858,#800,#2755,#4124,#858,#800,#4272,#858,#800,#2910,#858,GetLastError,#2910,#2910,#858,GetLastError,#2910,#2910,#2910,#2910,#2910,#2755,#4272,#858,#800,#2755,#858,#861,#4124,#858,#800,#4272,#858,#800,#2910,#2910,#2910,#858,GetLastError,#2910,#2910,#2755,#4124,#858,#800,wcsncpy,#2910,GetLengthSid,GetLengthSid,#2910,#2910,#2910,#2755,#4272,#858,#800,#2756,#4124,#858,#800,#6278,#6279,#4272,#858,#800,GetLastError,#2910,#2910,#2910,swscanf,#2910,GetLengthSid,GetLengthSid,GetLengthSid,#2755,#4272,#858,#800,#858,GetLastError,#2910,#2755,#4272,#858,#800,#858,GetLastError,#2910,43_2_010383F6
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "x86" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c verJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe tapinstall.exe remove tap0901Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe tapinstall.exe install OemVista.inf tap0901Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop fastestvpndriverJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "x86" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i "Windows 7" Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\driversJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe release\nfregdrv.exe -u fastestvpndriverJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe release\nfregdrv.exe fastestvpndriverJump to behavior
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6276 -ip 6276
          Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 1076
          Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
          Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
          Source: C:\Program Files\FastestVPN\FastestVPN.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Users\user\AppData\Local\Temp\Launcher.exe C:\Users\user\AppData\Local\Temp\Launcher.exe
          Source: FastestVPN.exe, FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmpBinary or memory string: Shell_TrayWnd
          Source: PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RegDeleteKeyWRegEnumKeyExWRegEnumValueWRegOpenKeyExWRoundingMode(RtlGetVersionRtlInitStringRtlMoveMemorySelectedCountSetBrushOrgExSetScrollInfoSetWindowLongShellExecuteWShell_TrayWndShutting downStartServiceWStarting%s %sSysFreeStringSysListView32Thread32FirstUnknown stateValueOverflowVirtualUnlockWTSFreeMemoryWireGuard: %sWriteConsoleWbad flushGen bad map statedalTLDpSugct?debugCall2048effect == nilexchange fullfatal error: getTypeInfo: gethostbynamegetservbynameinvalid UTF-8invalid base invalid indexinvalid stylelevel 3 resetload64 failedmin too largenil stackbasenot availableout of memoryparsing time runtime: seq=runtime: val=srmount errortimer expiredtraceStackTabvalue method wglShareListswireguard-%s-wireguard.dllxadd64 failedxchg64 failed}
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA31B20 cpuid 10_2_00007FF70AA31B20
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: try_get_function,GetLocaleInfoW,10_2_00007FF70AA18B44
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,10_2_00007FF70AA24CB8
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,10_2_00007FF70AA24960
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,10_2_00007FF70AA24E0C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,10_2_00007FF70AA24D3C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_2_00007FF70AA24ED0
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,10_2_00007FF70AA17BF8
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,10_2_00007FF70AA17B7C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,10_2_00007FF70AA17A70
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: GetLocaleInfoW,10_2_00007FF70AA2534C
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_00007FF70AA25478
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: GetLocaleInfoW,10_2_00007FF70AA25120
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_00007FF70AA25278
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: GetLocaleInfoA,25_2_00406C2C
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: GetLocaleInfoA,25_2_10011E31
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70A9E4820 SetupDiGetDeviceRegistryPropertyW,GetLastError,SetupDiGetDeviceRegistryPropertyW,10_2_00007FF70A9E4820
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Windows\System32\reg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Windows\System32\reg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
          Source: C:\Windows\System32\reg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
          Source: C:\Windows\System32\reg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductId
          Source: C:\Windows\System32\reg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductId4
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmpQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeQueries volume information: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tap0901.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{3501cea1-1def-284d-aeaa-53ba66ad3796}\tap0901.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\SingleInstanceApplication.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.DI.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.Abstractions.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Microsoft.Bcl.AsyncInterfaces.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\System.Threading.Tasks.Extensions.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.ViewModel.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\VPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.Diagnostics.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.BLL.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.Data.Local.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.Data.Remote.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Hardcodet.NotifyIcon.Wpf.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\WpfAnimatedGif.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Newtonsoft.Json.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Microsoft.AppCenter.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Microsoft.AppCenter.Analytics.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\SQLitePCLRaw.batteries_v2.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\SQLitePCLRaw.core.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\SQLitePCLRaw.provider.dynamic_cdecl.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\System.Memory.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices.RuntimeInformation\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Runtime.InteropServices.RuntimeInformation.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ValueTuple\v4.0_4.0.0.0__cc7b13ffcd2ddd51\System.ValueTuple.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\System.Runtime.CompilerServices.Unsafe.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Flurl.Http.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\Flurl.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\BouncyCastle.Crypto.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Hosting.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Owin.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Host.HttpListener.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\fix-dns-leak-32.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\iphelperclose.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.AspNet.SignalR.Core.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Cors.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Cors.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Diagnostics.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Diagnostics.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Host.HttpListener.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Hosting.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Security.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Newtonsoft.Json.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Newtonsoft.Json.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Owin.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\System.Web.Cors.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.AdvancedNetwork.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.OpenVpn.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.OpenVpn.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.RAS.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.RAS.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\subinacl.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.Common.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\fix-dns-leak-32.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\iphelperclose.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Microsoft.Owin.Diagnostics.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\Newtonsoft.Json.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\VPN.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\FastestVPN.exe VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Program Files\FastestVPN\SingleInstanceApplication.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Program Files\FastestVPN\FastestVPN.exeCode function: 34_2_02D227C8 CreateNamedPipeA,34_2_02D227C8
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeCode function: 10_2_00007FF70AA18BC8 try_get_function,GetSystemTimeAsFileTime,10_2_00007FF70AA18BC8
          Source: C:\Program Files\FastestVPN\subinacl.exeCode function: 43_2_0102E7AC __EH_prolog,#540,#2755,#858,#2910,#2910,LookupAccountNameW,#861,#942,#940,#4197,#4197,#800,#2910,#2910,LookupAccountNameW,#858,43_2_0102E7AC
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_00401160 GetStartupInfoA,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__ioinit,__amsg_exit,GetCommandLineA,___crtGetEnvironmentStringsA,__setargv,__amsg_exit,__setenvp,__amsg_exit,__cinit,__amsg_exit,__wincmdln,25_2_00401160
          Source: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Program Files\FastestVPN\Resources\ComDebug.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Windows\System32\svchost.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4 Blob

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: C:\Windows\System32\svchost.exeRegistry value created: Jump to behavior
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmpBinary or memory string: OWIN_SERVER@Microsoft.Owin.Host.HttpListener
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3308225688.0000000004542000.00000002.00000001.01000000.00000037.sdmpBinary or memory string: OWIN_SERVERAMicrosoft.Owin.Host.HttpListenerPORT
          Source: FastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OWIN_SERVER
          Source: FastestVPN.WindowsService.exeBinary or memory string: WIN_SERVER

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_10014170 ?nf_deleteBindingRules@nfapi@@YA?AW4_NF_STATUS@@XZ,EnterCriticalSection,LeaveCriticalSection,DeviceIoControl,LeaveCriticalSection,LeaveCriticalSection,25_2_10014170
          Source: C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exeCode function: 25_2_100141E0 ?nf_addBindingRule@nfapi@@YA?AW4_NF_STATUS@@PAU_NF_BINDING_RULE@1@H@Z,EnterCriticalSection,LeaveCriticalSection,DeviceIoControl,LeaveCriticalSection,LeaveCriticalSection,25_2_100141E0
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          1
          Valid Accounts
          1
          Windows Management Instrumentation
          1
          Scripting
          1
          Abuse Elevation Control Mechanism
          111
          Disable or Modify Tools
          1
          Network Sniffing
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          1
          LSASS Driver
          1
          LSASS Driver
          11
          Deobfuscate/Decode Files or Information
          11
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol11
          Input Capture
          2
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts13
          Command and Scripting Interpreter
          11
          DLL Side-Loading
          11
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          Security Account Manager4
          File and Directory Discovery
          SMB/Windows Admin SharesData from Network Shared Drive13
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts13
          Service Execution
          1
          Valid Accounts
          1
          Valid Accounts
          3
          Obfuscated Files or Information
          NTDS1
          Network Sniffing
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud Accounts2
          PowerShell
          45
          Windows Service
          11
          Access Token Manipulation
          2
          Software Packing
          LSA Secrets295
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled Task2
          Registry Run Keys / Startup Folder
          45
          Windows Service
          1
          Timestomp
          Cached Domain Credentials2
          Query Registry
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items213
          Process Injection
          11
          DLL Side-Loading
          DCSync351
          Security Software Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job2
          Registry Run Keys / Startup Folder
          1
          File Deletion
          Proc Filesystem2
          Process Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt43
          Masquerading
          /etc/passwd and /etc/shadow61
          Virtualization/Sandbox Evasion
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          Valid Accounts
          Network Sniffing1
          Application Window Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd2
          Modify Registry
          Input Capture3
          System Owner/User Discovery
          Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task61
          Virtualization/Sandbox Evasion
          KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
          Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers11
          Access Token Manipulation
          GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
          Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job213
          Process Injection
          Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524840 Sample: PVUfopbGfc.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 76 109 api.fastestvpn.com 2->109 131 Found malware configuration 2->131 133 Malicious sample detected (through community Yara rule) 2->133 135 Multi AV Scanner detection for dropped file 2->135 137 8 other signatures 2->137 10 PVUfopbGfc.exe 2 2->10         started        13 svchost.exe 2 2->13         started        15 FastestVPN.WindowsService.exe 2->15         started        18 5 other processes 2->18 signatures3 process4 dnsIp5 97 C:\Users\user\AppData\...\PVUfopbGfc.tmp, PE32 10->97 dropped 21 PVUfopbGfc.tmp 28 177 10->21         started        24 drvinst.exe 12 13->24         started        26 drvinst.exe 43 2 13->26         started        139 Reads the Security eventlog 15->139 141 Reads the System eventlog 15->141 111 api.fastestvpn.com 104.22.21.170, 443, 49734 CLOUDFLARENETUS United States 18->111 113 127.0.0.1 unknown unknown 18->113 143 Suspicious powershell command line found 18->143 145 Modifies the DNS server 18->145 28 WerFault.exe 18->28         started        30 powershell.exe 18->30         started        file6 signatures7 process8 file9 81 C:\Program Files\...\unins000.exe (copy), PE32 21->81 dropped 83 C:\Program Files\...\subinacl.exe (copy), PE32 21->83 dropped 85 C:\Program Files\...\nfapi.dll (copy), PE32 21->85 dropped 95 220 other files (198 malicious) 21->95 dropped 32 ComDebug.exe 21->32         started        36 cmd.exe 1 21->36         started        38 cmd.exe 1 21->38         started        44 7 other processes 21->44 87 C:\Windows\System32\...\tap0901.sys (copy), PE32+ 24->87 dropped 89 C:\Windows\System32\...\SET98BB.tmp, PE32+ 24->89 dropped 91 C:\Windows\System32\...\tap0901.sys (copy), PE32+ 26->91 dropped 93 C:\Windows\System32\drivers\SET9DE9.tmp, PE32+ 26->93 dropped 40 dllhost.exe 28->40         started        42 conhost.exe 30->42         started        process10 file11 73 C:\Users\user\...\window_size_plugin.dll, PE32+ 32->73 dropped 75 C:\Users\user\...\window_manager_plugin.dll, PE32+ 32->75 dropped 77 C:\Users\...\url_launcher_windows_plugin.dll, PE32+ 32->77 dropped 79 9 other malicious files 32->79 dropped 115 Maps a DLL or memory area into another process 32->115 117 Found direct / indirect Syscall (likely to bypass EDR) 32->117 46 netsh.exe 32->46         started        119 Uses cmd line tools excessively to alter registry or file data 36->119 121 Queries sensitive system registry key value via command line tool 36->121 50 tapinstall.exe 1 8 36->50         started        52 reg.exe 1 36->52         started        54 conhost.exe 36->54         started        60 3 other processes 36->60 56 xcopy.exe 38->56         started        58 sc.exe 1 38->58         started        62 7 other processes 38->62 123 Reads the Security eventlog 44->123 125 Reads the System eventlog 44->125 64 5 other processes 44->64 signatures12 process13 file14 99 C:\Users\user\AppData\Local\Temp\dglbpg, PE32 46->99 dropped 101 C:\Users\user\AppData\Local\...\Launcher.exe, PE32 46->101 dropped 147 Writes to foreign memory regions 46->147 149 Found hidden mapped module (file has been removed from disk) 46->149 151 Switches to a custom stack to bypass stack traces 46->151 153 LummaC encrypted strings found 46->153 66 Launcher.exe 46->66         started        69 conhost.exe 46->69         started        103 C:\Users\user\AppData\...\tap0901.sys (copy), PE32+ 50->103 dropped 105 C:\Users\user\AppData\Local\...\SET9466.tmp, PE32+ 50->105 dropped 107 C:\Windows\System32\...\fastestvpndriver.sys, PE32+ 56->107 dropped 71 conhost.exe 58->71         started        signatures15 process16 signatures17 127 Switches to a custom stack to bypass stack traces 66->127 129 Found direct / indirect Syscall (likely to bypass EDR) 66->129

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          PVUfopbGfc.exe21%ReversingLabs
          SourceDetectionScannerLabelLink
          C:\Program Files\FastestVPN\BouncyCastle.Crypto.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.BLL.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.Common.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.DI.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.Data.Local.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.Data.Remote.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.Diagnostics.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.ViewModel.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\FastestVPN.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Flurl.Http.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Flurl.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Hardcodet.NotifyIcon.Wpf.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.AppCenter.Analytics.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.AppCenter.Crashes.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.AppCenter.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.AspNet.SignalR.Client.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.Bcl.AsyncInterfaces.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.Abstractions.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Microsoft.Extensions.DependencyInjection.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Newtonsoft.Json.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\ComDebug.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\desktop_drop_plugin.dll (copy)62%ReversingLabsWin64.Downloader.Rugmi
          C:\Program Files\FastestVPN\Resources\desktop_multi_window_plugin.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\devcon.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-6LAFJ.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\is-ISUTF.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tap0901.sys (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-5P6ME.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\i386\is-GNQS3.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tap0901.sys (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows10\i386\tapinstall.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-7J76O.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\amd64\is-9NM46.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tap0901.sys (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\amd64\tapinstall.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-PBM2F.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\i386\is-QN43A.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\i386\tap0901.sys (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\driver\windows\i386\tapinstall.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\file_selector_windows_plugin.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\flutter_custom_cursor_plugin.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\flutter_gpu_texture_renderer_plugin.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\flutter_windows.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-1155O.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-4JUC4.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-4R4LE.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-5M6KM.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-5RDD6.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-71J6V.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-71JPL.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-7L7U1.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-8UK12.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-9BMN3.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-9HBCL.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-BERNA.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-BTQQJ.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-EJ1T1.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-FO4BS.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-J49VG.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-J9ANF.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-JF6RJ.tmp62%ReversingLabsWin64.Downloader.Rugmi
          C:\Program Files\FastestVPN\Resources\is-K889R.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-KHPQG.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-MI83V.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-O5204.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-OJSLF.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-Q7RHP.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-QG142.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-QLSLT.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-QN5KA.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-QOP0D.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-SADIQ.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-T7NGU.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-TSTOA.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\is-UCO86.tmp0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\libcrypto-1_1-x64.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\libeay32.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\liblzo2-2.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\libpkcs11-helper-1.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\libssl-1_1-x64.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\libssl32.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\msvcr100.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\openssl.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\openvpn.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\openvpnserv.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\openvpnserv2.exe (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\screen_retriever_plugin.dll (copy)0%ReversingLabs
          C:\Program Files\FastestVPN\Resources\sp\driver\windows7\amd64\fastestvpndriver.sys (copy)0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://www.innosetup.com/0%URL Reputationsafe
          http://ip-api.com/json0%URL Reputationsafe
          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/02/trust/Issue0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/02/sc0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          api.fastestvpn.com
          104.22.21.170
          truefalse
            unknown
            fp2e7a.wpc.phicdn.net
            192.229.221.95
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              answerrsdo.shoptrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.vmware.com/0ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  http://schemas.datacontract.orgFastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    http://anglebug.com/8280enableTranslatedShaderSubstitutionCheckComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                      unknown
                      http://anglebug.com/4633ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                        unknown
                        http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658642223.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2658999518.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656545355.0000025FA3CF1000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2656053801.0000025FA3F72000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2655997626.0000025FA3CF2000.00000004.00000020.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000003.2641290540.0000025FA46F0000.00000004.00000001.00020000.00000000.sdmp, is-QN5KA.tmp.1.dr, file_selector_windows_plugin.dll.48.dr, is-QG142.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drfalse
                          unknown
                          https://anglebug.com/7382ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                            unknown
                            https://github.com/aspnet/AspNetKatanadFastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://crbug.com/1356053ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                  unknown
                                  http://schemas.datacontract.org/2004/07/System.ServiceProcessFastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://github.com/dotnet/corefx/tree/7601f4f6225089ffFastestVPN.exefalse
                                      unknown
                                      https://scripts.sil.org/OFLFastestVPN.exe, 00000022.00000002.3338344676.0000000009112000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://www.fastestvpn.com/PVUfopbGfc.exe, 00000000.00000003.2704325303.0000000002316000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.exe, 00000000.00000003.2036701725.0000000002870000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2042009552.00000000034D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                          unknown
                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xssvchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://crbug.com/110263ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                              unknown
                                              https://www.innosetup.com/PVUfopbGfc.exe, 00000000.00000003.2038232664.000000007FB7B000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.exe, 00000000.00000003.2037873390.0000000002870000.00000004.00001000.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000000.2039732775.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://anglebug.com/6929ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                  unknown
                                                  http://signalr.net/FastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmpfalse
                                                    unknown
                                                    https://in.appcenter.ms./logs?api-version=1.0.0FastestVPN.exe, 00000022.00000002.3330868755.00000000065B2000.00000002.00000001.01000000.0000002A.sdmpfalse
                                                      unknown
                                                      http://Passport.NET/tb_svchost.exe, 00000021.00000002.3300907602.0000019750681000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3303486786.00000197514AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://anglebug.com/7246ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                          unknown
                                                          https://anglebug.com/7369ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                            unknown
                                                            https://anglebug.com/7489ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                              unknown
                                                              https://crbug.com/593024ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                unknown
                                                                http://crl.ver)svchost.exe, 00000021.00000002.3301375524.00000197506D3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2448782040.00000197506DB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000026.00000002.3304311299.000001A809400000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://issuetracker.google.com/161903006ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                    unknown
                                                                    https://crbug.com/1300575ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                      unknown
                                                                      https://crbug.com/710443ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                        unknown
                                                                        https://crbug.com/1060012ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                          unknown
                                                                          http://anglebug.com/3997ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                            unknown
                                                                            http://anglebug.com/4722ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                              unknown
                                                                              http://crbug.com/642605ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                unknown
                                                                                https://github.com/hardcodet/wpf-notifyiconFastestVPN.exe, FastestVPN.exe, 00000022.00000002.3327281264.00000000060A2000.00000002.00000001.01000000.0000001F.sdmpfalse
                                                                                  unknown
                                                                                  http://anglebug.com/1452ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                    unknown
                                                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdessvchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2533181374.0000019750F77000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://login.ecursvchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        http://crl.entrust.net/ts2ca.crl0PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2606870926.0000000000AB7000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drfalse
                                                                                          unknown
                                                                                          https://crbug.com/650547callClearTwiceUsingComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                            unknown
                                                                                            http://crl.entrust.net/g2ca.crl0PVUfopbGfc.tmp, 00000001.00000002.2700520104.000000000018C000.00000004.00000010.00020000.00000000.sdmp, PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, FastestVPN.WindowsService.exe, 0000002A.00000002.2608775109.0000000000ED0000.00000004.00000020.00020000.00000000.sdmp, is-O5MTV.tmp.1.dr, is-OTL5D.tmp.1.dr, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-21P0F.tmp.1.dr, is-71J6V.tmp.1.drfalse
                                                                                              unknown
                                                                                              http://crbug.com/1420130ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                unknown
                                                                                                http://anglebug.com/3502ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                  unknown
                                                                                                  http://anglebug.com/3623ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                    unknown
                                                                                                    http://anglebug.com/3625ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                      unknown
                                                                                                      https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfsvchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        http://anglebug.com/3624ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                          unknown
                                                                                                          http://anglebug.com/2894ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                            unknown
                                                                                                            http://ip-api.com/jsonFastestVPN.exe, FastestVPN.exe, 00000022.00000002.3325390125.0000000005DE2000.00000002.00000001.01000000.0000001E.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsvchost.exe, 00000021.00000003.2438224753.0000019750F3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438294098.0000019750F63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              http://anglebug.com/3862ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                unknown
                                                                                                                https://www.wireguard.com/donations/keyPVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  http://schemas.datacontract.org/2004/07/System.ServiceProcessdFastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    http://anglebug.com/4836ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                      unknown
                                                                                                                      https://issuetracker.google.com/issues/166475273ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                        unknown
                                                                                                                        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#PVUfopbGfc.tmp, 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, ComDebug.exe, 00000030.00000002.2669578005.0000025FA4009000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000032.00000002.2825661828.0000000005235000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000035.00000002.2857488192.0000000002774000.00000004.00000800.00020000.00000000.sdmp, is-1ASBC.tmp.1.dr, is-K889R.tmp.1.dr, is-71J6V.tmp.1.drfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%svchost.exe, 00000021.00000002.3300708756.0000019750645000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          http://anglebug.com/3970ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                            unknown
                                                                                                                            http://www.w3.oFastestVPN.WindowsService.exe, 0000002A.00000002.2608877205.00000000027F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              unknown
                                                                                                                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsvchost.exe, 00000021.00000003.2542019425.0000019750F76000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302496212.0000019750F82000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://signup.live.com/signup.aspxsvchost.exe, 00000021.00000003.2438269726.0000019750F40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                unknown
                                                                                                                                https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601svchost.exe, 00000021.00000003.2438583076.0000019750F56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  unknown
                                                                                                                                  https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    unknown
                                                                                                                                    http://anglebug.com/5901ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                      unknown
                                                                                                                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAAAAAsvchost.exe, 00000021.00000003.2501552028.0000019750F29000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        unknown
                                                                                                                                        http://anglebug.com/3965ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                          unknown
                                                                                                                                          https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2438372704.0000019750F2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            unknown
                                                                                                                                            https://anglebug.com/7161ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                              unknown
                                                                                                                                              https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604svchost.exe, 00000021.00000003.2438073307.0000019750F52000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                unknown
                                                                                                                                                https://github.com/ericsink/SQLitePCL.rawXFastestVPN.exe, 00000022.00000002.3351200547.000000000BE32000.00000002.00000001.01000000.0000002E.sdmpfalse
                                                                                                                                                  unknown
                                                                                                                                                  https://anglebug.com/7162ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                    unknown
                                                                                                                                                    http://anglebug.com/3729ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                      unknown
                                                                                                                                                      http://anglebug.com/5906ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                        unknown
                                                                                                                                                        http://crbug.com/830046ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                          unknown
                                                                                                                                                          http://anglebug.com/2517ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                            unknown
                                                                                                                                                            http://anglebug.com/4937ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                              unknown
                                                                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesue1svchost.exe, 00000021.00000003.2533154446.0000019750F6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                unknown
                                                                                                                                                                https://fastestvpn.com/faq?device=windowsFastestVPN.exe, FastestVPN.exe, 00000022.00000002.3324911285.0000000005D72000.00000002.00000001.01000000.0000001A.sdmpfalse
                                                                                                                                                                  unknown
                                                                                                                                                                  https://issuetracker.google.com/166809097ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                    unknown
                                                                                                                                                                    http://ocsp.digicert.coComDebug.exe, 00000030.00000002.2669360248.0000025FA3DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                      unknown
                                                                                                                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesvchost.exe, 00000021.00000003.2555530538.00000197506CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                      • URL Reputation: safe
                                                                                                                                                                      unknown
                                                                                                                                                                      https://github.com/ericsink/SQLitePCL.rawHFastestVPN.exe, 00000022.00000002.3352299163.000000000C172000.00000002.00000001.01000000.0000002F.sdmpfalse
                                                                                                                                                                        unknown
                                                                                                                                                                        http://crbug.com/672380ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                          unknown
                                                                                                                                                                          https://github.com/SignalR/SignalR/tree/7f53f266daf1aad3dabb1b6d7a71d4c1501ec8dcFastestVPN.WindowsService.exe, FastestVPN.WindowsService.exe, 0000001D.00000002.2584816506.0000000005A92000.00000002.00000001.01000000.0000000E.sdmpfalse
                                                                                                                                                                            unknown
                                                                                                                                                                            https://g.live.com/odclientsettings/Prod/C:svchost.exe, 00000026.00000003.2482684273.000001A8092C3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              unknown
                                                                                                                                                                              http://crbug.com/941620allowTranslateUniformBlockToStructuredBufferThereComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                unknown
                                                                                                                                                                                http://schemas.xmlsoap.org/ws/2005/02/scsvchost.exe, 00000021.00000002.3302070338.0000019750F13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.2849011574.0000019750F74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.3302224787.0000019750F5F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                • URL Reputation: safe
                                                                                                                                                                                unknown
                                                                                                                                                                                http://anglebug.com/3832ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                  unknown
                                                                                                                                                                                  https://github.com/tmenier/Flurl.gitFastestVPN.exe, FastestVPN.exe, 00000022.00000002.3351506959.000000000BE72000.00000002.00000001.01000000.00000032.sdmp, FastestVPN.exe, 00000022.00000002.3351847731.000000000BE92000.00000002.00000001.01000000.00000033.sdmpfalse
                                                                                                                                                                                    unknown
                                                                                                                                                                                    https://crbug.com/811661ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                      unknown
                                                                                                                                                                                      https://github.com/SignalR/SignalR/tree/7f53f266daf1aad3dabb1b6d7a71d4c1501ec8dcdFastestVPN.WindowsService.exe, 0000002F.00000002.3304056218.0000000001BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                        unknown
                                                                                                                                                                                        http://anglebug.com/8172ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                          unknown
                                                                                                                                                                                          https://crbug.com/1091824ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                            unknown
                                                                                                                                                                                            http://anglebug.com/1085ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                              unknown
                                                                                                                                                                                              https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUPVUfopbGfc.exe, 00000000.00000000.2036244476.0000000000401000.00000020.00000001.01000000.00000003.sdmpfalse
                                                                                                                                                                                                unknown
                                                                                                                                                                                                http://anglebug.com/6651ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                                  unknown
                                                                                                                                                                                                  https://anglebug.com/4830ComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                                    unknown
                                                                                                                                                                                                    http://anglebug.com/5007disableDrawBuffersIndexedDisableComDebug.exe, 00000030.00000002.2672367606.00007FF8A80B8000.00000002.00000001.01000000.00000048.sdmpfalse
                                                                                                                                                                                                      unknown
                                                                                                                                                                                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdPsvchost.exe, 00000021.00000003.2554874023.0000019750F79000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        unknown
                                                                                                                                                                                                        https://github.com/dotnet/corefx/tree/c6cf790234e063b855fcdb50f3fb1b3cfac732758FastestVPN.exe, 00000022.00000002.3352911178.000000000C1E2000.00000002.00000001.01000000.00000030.sdmpfalse
                                                                                                                                                                                                          unknown
                                                                                                                                                                                                          • No. of IPs < 25%
                                                                                                                                                                                                          • 25% < No. of IPs < 50%
                                                                                                                                                                                                          • 50% < No. of IPs < 75%
                                                                                                                                                                                                          • 75% < No. of IPs
                                                                                                                                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                          104.22.21.170
                                                                                                                                                                                                          api.fastestvpn.comUnited States
                                                                                                                                                                                                          13335CLOUDFLARENETUSfalse
                                                                                                                                                                                                          IP
                                                                                                                                                                                                          127.0.0.1
                                                                                                                                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                          Analysis ID:1524840
                                                                                                                                                                                                          Start date and time:2024-10-03 10:28:07 +02:00
                                                                                                                                                                                                          Joe Sandbox product:CloudBasic
                                                                                                                                                                                                          Overall analysis duration:0h 12m 41s
                                                                                                                                                                                                          Hypervisor based Inspection enabled:false
                                                                                                                                                                                                          Report type:full
                                                                                                                                                                                                          Cookbook file name:default.jbs
                                                                                                                                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                          Number of analysed new started processes analysed:54
                                                                                                                                                                                                          Number of new started drivers analysed:0
                                                                                                                                                                                                          Number of existing processes analysed:0
                                                                                                                                                                                                          Number of existing drivers analysed:0
                                                                                                                                                                                                          Number of injected processes analysed:0
                                                                                                                                                                                                          Technologies:
                                                                                                                                                                                                          • HCA enabled
                                                                                                                                                                                                          • EGA enabled
                                                                                                                                                                                                          • AMSI enabled
                                                                                                                                                                                                          Analysis Mode:default
                                                                                                                                                                                                          Analysis stop reason:Timeout
                                                                                                                                                                                                          Sample name:PVUfopbGfc.exe
                                                                                                                                                                                                          renamed because original name is a hash value
                                                                                                                                                                                                          Original Sample Name:402aacbb8dc07d96733eee2292f709d89d65efbe82d55e0dd4b7764cdde287b5.exe
                                                                                                                                                                                                          Detection:MAL
                                                                                                                                                                                                          Classification:mal76.troj.spyw.expl.evad.winEXE@83/372@1/2
                                                                                                                                                                                                          EGA Information:
                                                                                                                                                                                                          • Successful, ratio: 87.5%
                                                                                                                                                                                                          HCA Information:
                                                                                                                                                                                                          • Successful, ratio: 97%
                                                                                                                                                                                                          • Number of executed functions: 209
                                                                                                                                                                                                          • Number of non-executed functions: 234
                                                                                                                                                                                                          Cookbook Comments:
                                                                                                                                                                                                          • Found application associated with file extension: .exe
                                                                                                                                                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                                                                                                          • Excluded IPs from analysis (whitelisted): 192.229.221.95, 20.190.159.73, 40.126.31.71, 20.190.159.23, 40.126.31.73, 20.190.159.68, 20.190.159.71, 20.190.159.2, 20.190.159.64, 184.28.90.27, 20.189.173.20, 20.42.65.92
                                                                                                                                                                                                          • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, fs.microsoft.com, slscr.update.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, cacerts.digicert.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, ocsps.ssl.com, login.live.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                                                                                                                                          • Execution Graph export aborted for target powershell.exe, PID 5836 because it is empty
                                                                                                                                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                                                                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                                                                                          • VT rate limit hit for: PVUfopbGfc.exe
                                                                                                                                                                                                          TimeTypeDescription
                                                                                                                                                                                                          04:29:41API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                                                                                                                                          04:29:42API Interceptor4x Sleep call for process: powershell.exe modified
                                                                                                                                                                                                          04:29:45API Interceptor23x Sleep call for process: FastestVPN.exe modified
                                                                                                                                                                                                          04:29:51API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                                                                                          04:29:57API Interceptor1x Sleep call for process: dllhost.exe modified
                                                                                                                                                                                                          04:30:00API Interceptor1x Sleep call for process: ComDebug.exe modified
                                                                                                                                                                                                          04:30:07API Interceptor3x Sleep call for process: netsh.exe modified
                                                                                                                                                                                                          10:29:31AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FastestVPN.lnk
                                                                                                                                                                                                          No context
                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                          fp2e7a.wpc.phicdn.netOqAVRCkQ3T.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          mapMd1URzq.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          mnFHs2DuKg.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          https://email.mg.pmctraining.com/c/eJwkkcuSojAUhp_muJOKJyHAgoXTyMw41lxaa9TepZNwkUvoEER8-i7o3Vf5_tS5qVhRobla6XgTYBCSaMP9VRFHAWWMaKZYqJifqSALMoEkyiiXWvBsVcZaCn-jwmCtA63XQaTFmoVhuNZSURVo5RPCgJEm97pGOivKtmxzT5pmVceFc10PdAuYAqbjOHq5MXmtPWm8oQJMB1sDTT-AJqz9rc_hMPwrt93h9id50qkA5FY6oMnlyEiJ-zFZQtMkT4C8F0ATB8h1byXQL5fmu5cteUx9uGswPcwxM1ipgSaAXKr5y5GfwtqEw05apk_lGF1-zE7M8tL9rZJs_1WwTvb_j-QKyO96lo9bW7n6w07X8_j289urze-_APkgliZnmsdJRNMB-pjWMhN9UZrWWd2qft7J8l6Zyiyw3-TiuJAUnZOFWBgwvZ4fncRoODRdcUW3VU39FJfX5xUj8v49Hd5e_Ns7EqDJysaiLnvTejchK2DkXval66VxtWjVcoZ7jJ8BAAD__0X-oIkGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          oRdgOQMxjr.exeGet hashmaliciousRedLineBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          https://globalairt.com/arull.php?7104797967704b536932307464507a53744a4c53704a7a4d77727273784c7a7453725374524c7a732f564c3477776474594841413d3dkkirkman@ssc.nsw.gov.auGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          v173TV3V11.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          0k3ibTiMjy.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          http://www.sunsetsafaris.com.au//homeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          http://ryo-blog-for-life.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 192.229.221.95
                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                          CLOUDFLARENETUShttps://fr089029.page.link/jdF1Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                          • 104.18.95.41
                                                                                                                                                                                                          tYeFOUhVLd.exeGet hashmaliciousRedLineBrowse
                                                                                                                                                                                                          • 104.20.3.235
                                                                                                                                                                                                          hH4dbIGfGT.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                          • 172.67.194.98
                                                                                                                                                                                                          QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 188.114.97.3
                                                                                                                                                                                                          QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 188.114.96.3
                                                                                                                                                                                                          QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                          • 188.114.96.3
                                                                                                                                                                                                          KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                                                          • 188.114.96.3
                                                                                                                                                                                                          A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                          • 188.114.96.3
                                                                                                                                                                                                          Updated New Order.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                                                                          • 188.114.96.3
                                                                                                                                                                                                          pl4VFaWQr8.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                          • 172.67.183.74
                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                          3b5074b1b5d032e5620f69f9f700ff0edNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          tYeFOUhVLd.exeGet hashmaliciousRedLineBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          SKMBT_77122012816310TD0128_17311_XLS.vbsGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          Purchase Order - PO14895.vbsGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          GeriOdemeBildirimi942.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          justificante de transferencia.vbsGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          Comprobante.lnk.lnkGet hashmaliciousLokibotBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          Comprobante.lnk.lnkGet hashmaliciousLokibotBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                                                                          • 104.22.21.170
                                                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                          C:\Program Files\FastestVPN\BouncyCastle.Crypto.dll (copy)OqAVRCkQ3T.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                            mapMd1URzq.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                              mnFHs2DuKg.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                External.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                                                                                                                                                                                  newvideozones.click.ps1Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    use_2024_t#U043e_#U043epen.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                      JetBrains.dotPeek.2024.1.3.web.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                        JetBrains.dotPeek.2024.1.3.web.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                          EmbravaConnect.msiGet hashmaliciousPrivateLoaderBrowse
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3316968
                                                                                                                                                                                                                            Entropy (8bit):6.532906510598102
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:JIBbo0WIgmjljFtXCdRLRBcJd+KaGxHIkMNqzP56O8lZ7qXUqi9Y:6BbBWIgWljGxRB/LLY
                                                                                                                                                                                                                            MD5:0CF454B6ED4D9E46BC40306421E4B800
                                                                                                                                                                                                                            SHA1:9611AA929D35CBD86B87E40B628F60D5177D2411
                                                                                                                                                                                                                            SHA-256:E51721DC0647F4838B1ABC592BD95FD8CB924716E8A64F83D4B947821FA1FA42
                                                                                                                                                                                                                            SHA-512:85262F1BC67A89911640F59A759B476B30CA644BD1A1D9CD3213CC8AAE16D7CC6EA689815F19B146DB1D26F7A75772CEB48E71E27940E3686A83EB2CF7E46048
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Joe Sandbox View:
                                                                                                                                                                                                                            • Filename: OqAVRCkQ3T.exe, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: mapMd1URzq.exe, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: mnFHs2DuKg.exe, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: External.exe, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: newvideozones.click.ps1, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: use_2024_t#U043e_#U043epen.zip, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: JetBrains.dotPeek.2024.1.3.web.exe, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: JetBrains.dotPeek.2024.1.3.web.exe, Detection: malicious, Browse
                                                                                                                                                                                                                            • Filename: EmbravaConnect.msi, Detection: malicious, Browse
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....R............" ..0..r2..........&1.. ....2...... ........................2.....6Q3...@.................................G&1.O.....2..............|2.. ....2.....X.(.p............................................ ............... ..H............text....p2.. ...r2................. ..`.rsrc.........2......t2.............@..@.reloc........2......z2.............@..B................{&1.....H...........$....................(.....................................V!........s.........*.~....-*(....o....o....o.........~....-.~.........~....*..( ...*...0..G.......(!....o"....s.1....s*,..%..(.... ....o.....o 0...Zo....t....o8(..(....*..0..$..........(.....(....o.....(!.......io#...*z...(....(!....o"...o....(....*..0............T....r...p.(O....o$....(....*..0..I.......sG...sB)..s.(..s.(...(....s6(....,..o%....2...(....sV(....+.....%..ox...*..( ...*V.(&.....}......}..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):30888
                                                                                                                                                                                                                            Entropy (8bit):6.550270680442998
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:RzfFYXOvijvSGpUprWHEvgr0KnB4C7GrhIYiRSk0FP27NBY3Yuv+U:RxyOg9bxr9qaGKYi8K/Y/+U
                                                                                                                                                                                                                            MD5:96D7E9527C5D8BDBA798F72B5FD9B94A
                                                                                                                                                                                                                            SHA1:C9CE9813C74493084D6E3DDA37C35C8822CA381F
                                                                                                                                                                                                                            SHA-256:6942DC9FDBB229D066BA3E1844883B9DA3EAE21F7035FFF2674C3F19C6331B55
                                                                                                                                                                                                                            SHA-512:BE88433F513C4D9F58BDDFED57427DEC12BA0490E2D7C79176144732FBB7969956FA55B03E462C50EA3508389B3C29BC5A559F4B6002C6022C93D059C65B5C44
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...f6............" ..0..F...........e... ........... ....................................`..................................e..O....................N...*...........d..8............................................ ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B................be......H.......\4..$0............................................................(....*..{....*"..}....*..{....*"..}....*V.(......(......(....*.0..7.........(....}.......}.......}......|......(...+..|....(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(......(......(......(.......(....*.0..?.........(....}3......}4......}5......}2.....|3.....(...+..|3...(....*..0..7.........(....}#......}$......}".....|#.....(...+..|#...(....*..0..?.........(....}.......}
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):70824
                                                                                                                                                                                                                            Entropy (8bit):6.23750269831583
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:rMDv5NwVvDK0HBDk4rVHe061i/kObvmaLLJBr+tTe7TK/SB0:UorK0HBDk4rV21HObvm2LJB4eHK/SO
                                                                                                                                                                                                                            MD5:0F7D6DEE75C3FBB958529AB6A351CBDF
                                                                                                                                                                                                                            SHA1:1CA639AB692ECD972C51C8BF826BF9BF089359FE
                                                                                                                                                                                                                            SHA-256:C5B07CBACD0FF045485A0A4CE6FB3CCB330A0623E3EFE347D61DA4E698FDE412
                                                                                                                                                                                                                            SHA-512:58F0B5ED44E3290D6C9FB0E624F2A351CD5BB4744A84AC55AC47FB1B087026DE4DBAA6BBC83255EEC51A2BB3ED9A680EF53E8FC7035586B4A74CA68016AE0F5D
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... F..........." ..0.............J.... ... ....... .......................`...........`.....................................O.... ...................*...@......D...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................,.......H.......0<................................................................("...*^.("......I...%...}....*:.(".....}....*b.{....%-.&*..s#...o$...*.0..)........{.........(%...t......|......(...+...3.*....0..)........{.........('...t......|......(...+...3.*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*2.(....s)...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):19112
                                                                                                                                                                                                                            Entropy (8bit):6.821071301483957
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:LVVVVVwhr+vtlzIYilpm0FP27NBY3Yuv+Z:LVVVVVwhKvtl8YijnK/Y/+Z
                                                                                                                                                                                                                            MD5:64E2269D156CA2AA5704E2E0908506F9
                                                                                                                                                                                                                            SHA1:0F7D6EECE52D8A9A91E389736BE1092739AA3014
                                                                                                                                                                                                                            SHA-256:B012720952E3FE9CB303E9EDB4314F924CB388D9C24FB63A968A3479113B665D
                                                                                                                                                                                                                            SHA-512:C845E7EB96ED29C564C28D42F07F5EB81C27568F0F89C343533384BF8E704B99566EA073E46259D9F3740A7A3D41AAB5BFA78AEAB05697100B3A179F5C1EDFB6
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c............" ..0..............6... ...@....... ..............................hj....`.................................16..O....@............... ...*...`......t5..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................e6......H.......("..L............................................................~....*.......*..s....*..s....*..0..B.......(....,.*s....(....(....(....(....(....(.....(....(....(.....(....*..(...+*F.(...+(...+(...+*F.(...+(...+(...+*F.(...+(...+(...+*.0..f........(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+*..(...+*...0...........-..*....8.......%o.....%o.....o........E........ ...>...+X..(....-...(....+....(......+:..(....-...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):432
                                                                                                                                                                                                                            Entropy (8bit):5.0141792226861375
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:MMHdGzNFF7ap+5v5OXrRf/2//FicYo4xT:JduPF7NhOXrRH2/d9y
                                                                                                                                                                                                                            MD5:8F6EB9E75E6A6F0C0D58FB697C10CEDF
                                                                                                                                                                                                                            SHA1:6944935DFDC33E0C6DB26869BF25EDA85A2622D8
                                                                                                                                                                                                                            SHA-256:E2B8677434501735FB0233ED0CC2FFEE5BF6FB4387C51DBCB2585A70E42E4F08
                                                                                                                                                                                                                            SHA-512:A946252B2E3705EAE751A2672D4ADE1499ECEB28C48B4BE6150C4201EE20A7B9A4450C75E06B07F5DAA3528041A566931D988FBD0C2EA90240D61008895BA44A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.623350319992477
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:21Vrp7wobZBVBhB3GmLiVWgktWe9JHEDIYirwt0FP27NBY3Yuv+1WyT1g:21VV7TbXX72MtWQJHEsYi/K/Y/+1Wy5g
                                                                                                                                                                                                                            MD5:D92BF2C8E0A192E18B1F0B24CCB75171
                                                                                                                                                                                                                            SHA1:2A6343C3409172E1D426B763151E0CBA3B35E473
                                                                                                                                                                                                                            SHA-256:BEED084878EACA4A745A53CC21FAAD1A76F4F82C955BB507496B5B9F23032F1C
                                                                                                                                                                                                                            SHA-512:71AD4963BCEBE516FD9EE526F2DD1ECB13F10E1424D0D3CED08A19A38D902DA562C9B1D0E308C4B898E30187773F040CF6A437210EFEF52B957623F798E59459
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R.s..........." ..0..2..........:Q... ...`....... ..............................I/....`..................................P..O....`...............:...*..........,P..8............................................ ............... ..H............text...@1... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................Q......H.......`(...'...........................................................0..M........r...p}.....r...p}.....(......{..... (....(....(......{..... (....(....(....*^~....-.s.........~....*..{....*"..}....*..{....*"..}....*..0..8........(........(.....(.....o....r...p(....o.......&..r...p*.*........--.......0..(.......(.....o........(.....(.......&..r...p*.*.................0..X........o.....[.&......+9...Z.o.... ....(........Z.X.o.... ....(......b`.......X...o.....[2..*.0..V...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):29352
                                                                                                                                                                                                                            Entropy (8bit):6.56368110636982
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:vT6rilChUvVsYQTJMS6V4B6PYikK/Y/+V7:7qSsYOwP7kK/77
                                                                                                                                                                                                                            MD5:1CFBF0CBA3C87653D9639ADA438C3291
                                                                                                                                                                                                                            SHA1:07E36A34319EAD85857CC022E277B69EA132750B
                                                                                                                                                                                                                            SHA-256:3525FCE82E2687D8EFAF992147B196881818856EA9EA851A8DC930751329A8DD
                                                                                                                                                                                                                            SHA-512:E95FC978E889BD62E92975EFD8F39161B6E43FE97451068552E3A71635943F990E4E8697323794D75F77BB12F3DE4E2CFADB5B9D80EF90F1992C82298EBFD00B
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.i..........." ..0..@...........^... ...`....... ....................................`.................................:^..O....`...............H...*..........|]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc...............F..............@..B................n^......H........1...+............................................................{....*:.(......}....*..0..)........u..........,.(.....{.....{....o....*.*.*v .5Q' )UU.Z(.....{....o....X*..0..:........r...p......%..{.......%q.........-.&.+.......o.....(....*..{....*:.(......}....*....0..)........u..........,.(.....{.....{....o....*.*.*v . .q )UU.Z(.....{....o....X*..0..:........r-..p......%..{.......%q.........-.&.+.......o.....(....*..{....*..{....*V.(......}......}....*.0..A.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):432
                                                                                                                                                                                                                            Entropy (8bit):5.0141792226861375
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:MMHdGzNFF7ap+5v5OXrRf/2//FicYo4xT:JduPF7NhOXrRH2/d9y
                                                                                                                                                                                                                            MD5:8F6EB9E75E6A6F0C0D58FB697C10CEDF
                                                                                                                                                                                                                            SHA1:6944935DFDC33E0C6DB26869BF25EDA85A2622D8
                                                                                                                                                                                                                            SHA-256:E2B8677434501735FB0233ED0CC2FFEE5BF6FB4387C51DBCB2585A70E42E4F08
                                                                                                                                                                                                                            SHA-512:A946252B2E3705EAE751A2672D4ADE1499ECEB28C48B4BE6150C4201EE20A7B9A4450C75E06B07F5DAA3528041A566931D988FBD0C2EA90240D61008895BA44A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):19624
                                                                                                                                                                                                                            Entropy (8bit):6.761472837087098
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:pwG3NNuGs7lkviba8FLdwIYieB0FP27NBY3Yuv+4pdS:F+V7PpFLdZYixK/Y/+4S
                                                                                                                                                                                                                            MD5:12A69C58D97C26D0132D493111E42345
                                                                                                                                                                                                                            SHA1:0DCC8570C7D76B660746A0F657607864F8764AD4
                                                                                                                                                                                                                            SHA-256:E6682B67F0C489BEB53C93C399D46CEAEBDD7096AD7DB984BF99DCC68E476F4C
                                                                                                                                                                                                                            SHA-512:3335371222BB282C55F1309432CD776CD146EFA9B6D17BF23997EFA6E3A741512FD95B9382EB719F400C6A70BD13E6A445A6011716B4C7637CF1083C8D669BE6
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..............8... ...@....... ...............................P....`.................................j8..O....@..............."...*...`.......7..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................8......H.......L'..`............................................................0..?.........(....}.......}.......}.......}......|......(...+..|....(....*..0..7.........(....}.......}.......}......|......(...+..|....(....*..0../.........(....}.......}......|......(...+..|....(....*..0..7.........(....}.......}.......}......|......(...+..|....(....*6..(...+(....*..(....*..(....*..{..........%..#...(.....%..!...(.....(.....(....*.0..e........{......E....8............(....o ......(!...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1192
                                                                                                                                                                                                                            Entropy (8bit):5.059106104983516
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:JduPF7NV+TkH2/17zVVXBOH2/17zVQ7uH2/XVUrPH2/+C9y:327Gwg1BOg1SagXSg+Cw
                                                                                                                                                                                                                            MD5:66373624F8B60F41B8FEC0E61779C0AC
                                                                                                                                                                                                                            SHA1:0D3BE3C009F0A2260F89C3FBC9FFEBA0061C17F2
                                                                                                                                                                                                                            SHA-256:FE0A5830D875B8BD0864BF4F85705D4F2E3D7A575C07B2B5A18041558DBA1386
                                                                                                                                                                                                                            SHA-512:74F084B2697F936122E371042FEF5740BF205914B3FA276F8F7C72561680BF2C39A7DD2970BDEDF36AACC20970CD9552A719211F30090881E498815D91C6CDD0
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-6.0.0.0" newVersion="6.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffc
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):124072
                                                                                                                                                                                                                            Entropy (8bit):6.169344446608534
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:LurAkSCDvkOtt+niUnQY8/LFEMnK8VQW5K/7:LJkSCDv+iUnQXLFEEM/7
                                                                                                                                                                                                                            MD5:2DC3102392DAEF9B935CDF4939A9B132
                                                                                                                                                                                                                            SHA1:F56261CE19BFC14F8317C2AA05F010E9ACFBCE02
                                                                                                                                                                                                                            SHA-256:B6D9088505C220F23132D78675004BC31E0FB5C04257357C2B02072EF8C28DAD
                                                                                                                                                                                                                            SHA-512:596AFAA1347CF730D2D0312857366EE3AD4C5C439E2F93BD6D38B29129C7B3530523B206FAEEF1DB3F6D9A18482162FF56321C9F1A1FA4F296F6B29AE8659321
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q............" ..0.................. ........... ....................... ......Q.....`.....................................O........................*..............8............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......d................................................................0...........s....%r...pr...po....%rk..pru..po....%r...pr...po....}......(....(...+o.....(...+o.......o....r!..p.o....(....}......o....}......o....}......o....}.....(....r%..p( ...-..(....re..p( ...,...}....*..}....*..{....*..{....*..{....*..{....*..{....*J.......s!...s:...*.~....%-.&~..........s!...%.....s:...*J.......s"...s#...*J.......s!...s:...*..0..........(...+o$.....E........9...^...*.r...pr...pr..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):432
                                                                                                                                                                                                                            Entropy (8bit):5.0141792226861375
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:MMHdGzNFF7ap+5v5OXrRf/2//FicYo4xT:JduPF7NhOXrRH2/d9y
                                                                                                                                                                                                                            MD5:8F6EB9E75E6A6F0C0D58FB697C10CEDF
                                                                                                                                                                                                                            SHA1:6944935DFDC33E0C6DB26869BF25EDA85A2622D8
                                                                                                                                                                                                                            SHA-256:E2B8677434501735FB0233ED0CC2FFEE5BF6FB4387C51DBCB2585A70E42E4F08
                                                                                                                                                                                                                            SHA-512:A946252B2E3705EAE751A2672D4ADE1499ECEB28C48B4BE6150C4201EE20A7B9A4450C75E06B07F5DAA3528041A566931D988FBD0C2EA90240D61008895BA44A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):2059432
                                                                                                                                                                                                                            Entropy (8bit):7.651137710710665
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:+3zNmj7tPN/PPINv2lYnvqfI1L3ciKKqjnTVlKJ+hgyiTebWmDXQHMkgXvYOdSYB:84vtPNvCv2Qqfobuvq+hqCTDgHMT
                                                                                                                                                                                                                            MD5:01CF6EF766C41BB2C99A2CCCDECC69C1
                                                                                                                                                                                                                            SHA1:8DD5EB983C1C8F2E3A2538E50295644BB778A69E
                                                                                                                                                                                                                            SHA-256:9A9B95CA40D32FA23A615A122FA3AAF7AEB32FBEF2850D729F77C1169FFC0452
                                                                                                                                                                                                                            SHA-512:9EE4D4D7852555F67CF0C9B372DCA87EC0727AB0A6FC5EAE309CF6BF5467FC75C6868A5E528D34AB605CDC736D30684D35A1451D4ABE3B99BA37D276474AC940
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G............"...0......D........... ... ....@.. ...............................P ...`.................................^...O.... ...A...........B...*..............8............................................ ............... ..H............text........ ...................... ..`.rsrc....A... ...B..................@..@.reloc...............@..............@..B........................H.......DD..T`......-....... v...........................................0..O.......s....%.o....%.o ...%.o!...%..o".....o#........($........(%..._,...o&...(....*.*..(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*...(.......(....(.......(....(.......(....(.....*.0..5........('...-..*.((.....o)...(*...(+...(,.......,..o-.....*............)........(....*2.(/...o0...*..(1...*.(2...*2.(....o3...*..(....o4...&.(.....o5....(.....o5....(....o6...&*2.(....o7
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1112
                                                                                                                                                                                                                            Entropy (8bit):5.030466366630491
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:JdArztW1oF7Nv+IcvH2/+GVTcvH2/+GVhOXrRH2/d9y:3Arzcq7h+Iag+GMg+G27Rgdw
                                                                                                                                                                                                                            MD5:B94AE93769D64791440B3C36CC82AC69
                                                                                                                                                                                                                            SHA1:E4AAAD9A0FB51051C8B25F768BC1563543F132C0
                                                                                                                                                                                                                            SHA-256:432BFD182828A531147812566CB3439702A243BB7A4C45CC816192F9CB91D4A5
                                                                                                                                                                                                                            SHA-512:AD978C59980C0194357D5070D53EA77C334493D14593C141B9DBEEF835FC688FD90C99236D687F50860FA7F4FD4125650E432A61EDF7917C77E4EE4E5E3D4E66
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup> .. <supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.8" />.. </startup>.. <runtime>.. <legacyCorruptedStateExceptionsPolicy enabled="true" />.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.Expression.Interactions" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.5.0.0" newVersion="4.5.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Windows.Interactivity" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.5.0.0" newVersion="4.5.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):117928
                                                                                                                                                                                                                            Entropy (8bit):6.160360774488817
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:Hzne5lbC/VlCG2OWMMdWWbWbWw+Hfz+8lKbchOD07PQCFP1IYmDe/WAbBuhEK/a:HFO4WMMdWWbWbWw+Hfz+8lKbchOD07PP
                                                                                                                                                                                                                            MD5:FDFDFE021B53B630939D27C6C90CB435
                                                                                                                                                                                                                            SHA1:AA0987A6EA6987BB9930B9167EC31C249EF9D885
                                                                                                                                                                                                                            SHA-256:D753A7EF62BABC2ADB5D1DBEB0BEBAA2B042CC01CC219726F32F761BBB0A711D
                                                                                                                                                                                                                            SHA-512:1FD0C74D0ED3AC4DF26D3E95C0F133E8024D77D1FD06E0C76C630D6AAC7B81124AA1DCA7CFFAC43BC34252A057414F8C3F8EC63A805323B1EF892B5F6A277D3B
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8............" ..0................. ........... ..............................U.....`.................................w...O........................*..............T............................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.........................................................................{ ...*..{!...*V.(".....} .....}!...*...0..A........u........4.,/(#....{ ....{ ...o$...,.(%....{!....{!...o&...*.*.*. '.(k )UU.Z(#....{ ...o'...X )UU.Z(%....{!...o(...X*...0..b........r...p......%..{ ......%q.........-.&.+.......o)....%..{!......%q.........-.&.+.......o)....(*...*>..su...%.}^...*...0...........(+...,..*...(....o.....8t....o......-2.{,....{-.....g...%..".o.....(/...s0...sk....88....{,...r
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):49320
                                                                                                                                                                                                                            Entropy (8bit):6.325351798150663
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:Qmbo2ICFobV6wsLIcUIh/61jCouvi1Ys7ZYiG6K/Y/+Z:QmbrbU6ws0cGjCoei1Ys7Z7G6K/P
                                                                                                                                                                                                                            MD5:C22900453EF4B917460ADEA7DE87225B
                                                                                                                                                                                                                            SHA1:6878237656DA68C046FB95FAA8CAF3B4C719851B
                                                                                                                                                                                                                            SHA-256:9AF8C8105093B7D62FC578DAE3497FF0AD796C9ABD638EB14269DED4270DFF96
                                                                                                                                                                                                                            SHA-512:2E7D0EB99E2924FB375AAF8891968228193C65C133E362F66567C044E8B744ABC3A992EF7606644690D1BB81AD13A64A35D8107BDBDD9D5942BEA1DD1074EA3C
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0................. ........... ....................................`.................................p...O.......,................*..............T............................................ ............... ..H............text....... ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........L...\............................................................{"...*..{#...*V.($.....}".....}#...*...0..A........u........4.,/(%....{"....{"...o&...,.('....{#....{#...o(...*.*.*. ?Y.. )UU.Z(%....{"...o)...X )UU.Z('....{#...o*...X*...0..b........r...p......%..{"......%q.........-.&.+.......o+....%..{#......%q.........-.&.+.......o+....(,...*..{-...*..{....*V.($.....}-.....}....*.0..A........u........4.,/(%....{-....{-...o&...,.('....{.....{....o(...*.*.*. (... )UU.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):108200
                                                                                                                                                                                                                            Entropy (8bit):7.332504567097915
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Gn5VJM3T5szyxa9PuIKb8wmtyYVzH0cfNbQSi/GoP4YNjZ34A7GZK/ZIVQ:GWsEa9GIdyAUKWeYNl34AwK/ZV
                                                                                                                                                                                                                            MD5:261A5044C94F318DEEA20D178ED9F36E
                                                                                                                                                                                                                            SHA1:2A9704F70A543EE219481A3AA756A0CF151E1999
                                                                                                                                                                                                                            SHA-256:D17E9B0C62C224D1BA56E7206D8A44FE382FE99752C511BA211A7725D83FEF43
                                                                                                                                                                                                                            SHA-512:E53C320DBF6B2AAEEC01FE5AFF1FAD5A8D75B2483A78BA0E1B510F2A7A8C5C510ACD603541734F4A002748D0781FC11AFBF6967EBCDB41A6FC9A29C828ABC2A3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l.g..........." ..0..p.............. ........... ....................................`.....................................O....................|...*..............p............................................ ............... ..H............text....n... ...p.................. ..`.rsrc................r..............@..@.reloc...............z..............@..B........................H........O..|w..................,.......................................V!.)1......s.........*...0..$........u......,...o....*.u......,...o....*.0..&........u......,....o ...*.u......,....o!...*...0..&........u......,....o"...*.u......,....o#...*B.(Y...-.(....*.*..{!...*"..}!...*>.{....o.......*.0..9........(*.....($.....(......,..o%...-..,..o&...-..,..o%...*.*.*....0...........s'...}.....((....(....-..s....+.(....}......{....o....(....}.....(!....{...........s)...o.....{....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25976
                                                                                                                                                                                                                            Entropy (8bit):6.331152456306087
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:Z90ljCvGQJ+GlfmER/asDZ0WN1L4meT6pmOW2ZZWeQMWMLHRN7S37EHR9zCt+:Z9EIGk+GlfmERxcFz2ZSCL+7Ex9zS+
                                                                                                                                                                                                                            MD5:3C5DFBB4E3F1AD153EB2E203B56EA0AE
                                                                                                                                                                                                                            SHA1:59623BF1D67D87264C165E421F12426DA998AF46
                                                                                                                                                                                                                            SHA-256:9E8252429D0E6529B87A2C79A13119F4DF56ABE924949F3750B024C51D747378
                                                                                                                                                                                                                            SHA-512:94DF20E98A2E5D7AC93B63EFEBCE4DAAFBF25AB6B4A2B76AF0BB46D9EDE102AC8C8E1147D5813CDB879AADD5A8AA4073FD0E6066286AF4EF4D368FAB983BE3B5
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w............" ..0..4...........S... ...`....... ....................................`..................................S..O....`...............>..x'..........XR..T............................................ ............... ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@.reloc...............<..............@..B.................S......H.......l,..l%...................Q........................................(....*.0..H.........~....,...~....*~..........(......~....%-.&s....%...........,..(......*........#<.......0..%.......~..........(...............,..(.....*....................0..........~..........(....(....o....(...+....,..(......*...........".......0..0.......~..........(....(.....o.....(...+....,..(......*.........$.......0..).......~..........(....(......o.......,..(.....*....................0..b...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):53624
                                                                                                                                                                                                                            Entropy (8bit):6.18841715621451
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:mLtojuUUUbf/l0lwELEEEqi8g15qTLT5HGoV0weeezxSoL3G7Yl9zndG:mE17Iw8/i8gM5maee8SoL13zdG
                                                                                                                                                                                                                            MD5:B7ABAF6A90E95E585E71C0C22D90AF73
                                                                                                                                                                                                                            SHA1:C9756883D1738A9931D0BF58D6F69CBB8DFD5870
                                                                                                                                                                                                                            SHA-256:3BA247FDCC6953B5CC672A361983B7B0AF3051A83128970BCEBAB22036D1E859
                                                                                                                                                                                                                            SHA-512:3A67EF230A06FAE3095926EAD9AAF329009BC0F2ED6AA1E6683C426ADA29DDD9CB77EC3BE134DFC4CD10A1F675D518FB4986363C4FE649D4247770B96DBC7A56
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#2..........." ..0.................. ........... ...............................0....`.....................................O.......................x'..........t...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........E...w..........................................................&...(....*2.r...p(....*V.(......}......}....*..{....*..{....*..{....*..(......}......}......}.......}.......}....*..{....*..{....*..{....*..{....*..{....*...0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):147848
                                                                                                                                                                                                                            Entropy (8bit):6.032707503792338
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:yiq8kuub1o2/5pds7tUMZNFxtPwVrHlGZ6U1SiWUwBpXtNpTE1MNniv:WFwzFQ9FGZ1SityhtNpTECU
                                                                                                                                                                                                                            MD5:B6DB385295FA78A6AABCF217FD3C3F83
                                                                                                                                                                                                                            SHA1:71E2A93223A6B8204EED6B9834284C0FA1D7EBD0
                                                                                                                                                                                                                            SHA-256:ABF40F07643E6D29D0817021991F9D27410B7DCAEF80980D849634ACEF255BDC
                                                                                                                                                                                                                            SHA-512:122FDB77C0AC6A7A2ECF5519BB059097EF119390E6D3C34F9FAB303D60279EE8649175617E3B6FC2A3D118B422CE8BC1BFFC208332D0A9F012271325AC0A0EE7
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....@..........." ..0..............1... ...@....... ..............................0b....`.................................71..O....@...................'...`.......0..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................k1......H.......8...d].................../.......................................0..s........r...p(......(....,.r...psK...z.rW..po....-.r[..pro..p(X....*s.....~.....o....o......+8..o....t.........o.....o ...o!.....o.....o ...o!...o".....o#...-.....u........,...o$.....r...po%...,.r[..pr...p(X....*.rS..po%...,.r[..prg..p(X....*~&....~&......o%...,.....o'...&..o%...,.....o'...&.(....,..(....,.r...p.r...p((...sK...z.(....-&.(....-.r...p.r%..p((.....r)..p.((.....*.......U.E........(....*.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):149896
                                                                                                                                                                                                                            Entropy (8bit):6.136390335470081
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:PcRKLBm0ELV6Ra+eKBL24YzRk2XDuzEdnp+4WSspmfxPapkwN5RGV5xz/OEYW58R:qI0KRHeKBszRk2aApjsp7pBtZGh9
                                                                                                                                                                                                                            MD5:70B1C15FDBBFB88F91965DC7BBC5527F
                                                                                                                                                                                                                            SHA1:A473571DAC42819933CD7EF0C604F1EA0614D2F3
                                                                                                                                                                                                                            SHA-256:109878A7A6F6BD13637B7E3A2EBC22D37423716ECD4E954CC09BACB84B92F62B
                                                                                                                                                                                                                            SHA-512:C496EE2DDF6C401E9E48FB6D739C44200EBFE36B516E7608CECB3E32FEB620CE1531CC5DE26B1A4CD033C65FD002D6B6315B746CFB8B4D047A2954F6F33CA0A4
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5A............" ..0..............;... ...@....... ..............................Ri....`.................................N;..O....@...............&...#...`......X:..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B.................;......H.......h....Y..........H'.......9........................................(...+*.~....*.~....*.~....*..%-.&(....*..%-.&~ ...*....0..........(!......o"......(7.......*...................0..........(!......o...+...(...+....*....................~$...%-.&~%.....&...s'...%.$....(...+*.0..D.............,:......o(.....,......o(....3.........o)....(....+.....(...+.*.0..9.......s*......}+.....},.....}-................s/... ....(B...&*....0..$........,...r...p......%.....o~......o0...*
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):26752
                                                                                                                                                                                                                            Entropy (8bit):6.512503595653532
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:DulwnBhYlTVv2wK5idcgF4of1n6K9zUYJ:ywHYFtKYdcg/f1nXzUYJ
                                                                                                                                                                                                                            MD5:970B6E6478AE3AB699F277D77DE0CD19
                                                                                                                                                                                                                            SHA1:5475CB28998D419B4714343FFA9511FF46322AC2
                                                                                                                                                                                                                            SHA-256:5DC372A10F345B1F00EC6A8FA1A2CE569F7E5D63E4F1F8631BE367E46BFA34F4
                                                                                                                                                                                                                            SHA-512:F3AD2088C5D3FCB770C6D8212650EED95507E107A34F9468CA9DB99DEFD8838443A95E0B59A5A6CB65A18EBBC529110C5348513A321B44223F537096C6D7D6E0
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$:............" ..0..4...........S... ...`....... ....................................`..................................S..O....`...............@...(...........R..T............................................ ............... ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@.reloc...............>..............@..B.................S......H........'..P*..................,R........................................(....*..(....*^.(.......1...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....*..(....*..(....*..(....*..(....*:.(......}....*..{....*:.(......}....*..{....*:.(......}....*..{....*..(....*:.(......}....*..{....*^.(.......2...%...}....*:.(......}....*..{....*z.(......}.......2...%...}....*V.(......}......}....*..{....*..{....*:.(......}....*..{....*..{....*"..}....*..{....*"..}....*..{
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):48256
                                                                                                                                                                                                                            Entropy (8bit):6.234996524588368
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:AMWC5N7mKWPKz4VJ4e0jeuTGlBh0JzqPPxofk3l9z2I:Y67hCfV8j3TGlB+JsafkHzP
                                                                                                                                                                                                                            MD5:37EB7CCE6E282D3572D64C880E1AC3C8
                                                                                                                                                                                                                            SHA1:9A2952589A19D650932E7C633577EB9AFC04F959
                                                                                                                                                                                                                            SHA-256:039155F155C5D14F5B73F4EE2CD1FBD9290F391B88A1D2A0BA815569205EDB74
                                                                                                                                                                                                                            SHA-512:E3C2EF1CC52E3AA5BD77B74DEC93A4FC9E908DF823426F13CA304265D41605DE51970CC8C7E18C2E76319D3225707B2EA2D8613402A25C4FBD3951E70FCFD521
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....v..........." ..0.................. ........... ....................................`.....................................O........................(..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........=..da..........0.................................................(....*..(....*^.(.......>...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....**.-..(....*..s....z.~....*...0..........(....,..*..(.....o.......&...*...................0...........(.......(....-..,..*.*.(....,.r...p......%...%...(....*..( ...*.(....,.r...p......%...%...%...(....*...(!...*.(....,!r...p......%...%...%...%...(....*....("...*..,&(....,..r...pr...p.(....(#...*..($...*.*.(.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):88192
                                                                                                                                                                                                                            Entropy (8bit):6.25584016939133
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:0kUuBN7CjSkp9oa++t1BVryVKXDORdDeCNia6Lj4Fu/qSGnJdo0Wzs:ju/t/VryVKXeDezVLj4F/JdWQ
                                                                                                                                                                                                                            MD5:4186A905DC180A0CC2110403727BD792
                                                                                                                                                                                                                            SHA1:E0563D20CA7E95688A60F4BFC1AB0127EAE1F651
                                                                                                                                                                                                                            SHA-256:40DCB80A87A762745D0A15294B5CA7783A9EAD1D93AD352D25B5EDAF4994651E
                                                                                                                                                                                                                            SHA-512:1C3459232B41C531F01BCCE54E46799F2FB3FCD6C87D7F908C633ABCC718D9726D98E65F964B1A870D416A38F545971779054FE65F7C1299905FC7DC24FA2DEC
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&..........>E... ...`....... ....................................`..................................D..O....`...............0...(...........C..T............................................ ............... ..H............text...D%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc..............................@..B.................E......H........l..@...........02..0...`C........................................(....*..(....*^.(.......k...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....*.~....*..0..........(....,..*..(.....o ......&...*...................0...........(.......(!...-..,..*.*.(....,.r...p......%...%...("...*..(#...*.(....,.r...p......%...%...%...("...*...($...*.(....,!r...p......%...%...%...%...("...*....(%...*..,&(....,..r...pr...p.("...(&...*..('...*.*.(....,.r...p......%...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):711952
                                                                                                                                                                                                                            Entropy (8bit):5.967185619483575
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
                                                                                                                                                                                                                            MD5:195FFB7167DB3219B217C4FD439EEDD6
                                                                                                                                                                                                                            SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
                                                                                                                                                                                                                            SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
                                                                                                                                                                                                                            SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):256912
                                                                                                                                                                                                                            Entropy (8bit):6.232383775712062
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:WEq38uejOBA0ItZ1PNWPQqLlXXXXVXDBsXdZC/R0EjW0VnXNvdroJ:/q0jOBARWPRLlXXXXVXSXdZk0EjW0VnM
                                                                                                                                                                                                                            MD5:850A43E323656B86AE665D8B4FD71369
                                                                                                                                                                                                                            SHA1:099D6E80C394CCC5233E1CBD6B29769DA9E0E2AA
                                                                                                                                                                                                                            SHA-256:539423D2E436E198DF15B5577D816DC306BA4C03B1362F7731E675B51F4A5F42
                                                                                                                                                                                                                            SHA-512:1F2778040E906EA2939A8B0A682E267599AA8422F81EA83BB6C980A304B569AD750EF3E81E1490EDD5B1D74E734A2CB82F428F47096C55436037E03E516D2378
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......w...3...3...3......6..........u..9....u..#....u..`......"......;......1... r..$...3...... r..:... r&.2...3.N.2... r..2...Rich3...........PE..d.....wf.........."....(.Z.....................@.............................0......#.....`.................................................Tq..T....... ........%........... .......#.......................%..(...`"..@............p.. ............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data....0...........v..............@....pdata...%.......&..................@..@.rsrc... ...........................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):359
                                                                                                                                                                                                                            Entropy (8bit):5.09733291062762
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:i4Z2TyUdkl9WUyUdkwc1+XMoHkyUdk3LASg0TqeXMFXA98XfFZ/FvjCzISMOmEm:jZELklIULktkXxELk35q0MhA98vFZ/FV
                                                                                                                                                                                                                            MD5:777B3CBF81DDD8B238BDEDDDEA17AFED
                                                                                                                                                                                                                            SHA1:C72F46715DCBC9BDA1E2BEEAC8AF2A64E7B48D08
                                                                                                                                                                                                                            SHA-256:DACE14B4A5268728E67A9E78D8F0877F4C87F6B87DDD40DFF28A11E9E42945CF
                                                                                                                                                                                                                            SHA-512:5C6D302F93381EBF65ADD3DAA0EB4813270C5D9A042AD9B8A48A575ADC4E751D3834292BB61AEF6A5458036AE6E3C83C8EDFAE5CF828D81317ACAE6675B8E619
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:If (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))..{ ..$arguments = "& '" + $myinvocation.mycommand.definition + "'"..Start-Process powershell -Verb runAs -ArgumentList $arguments..Break..}.. Set-NetConnectionProfile -NetworkCategory Private
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PEM certificate
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1912
                                                                                                                                                                                                                            Entropy (8bit):6.013187457463572
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:LrZOGn3n3+NKHqtdSLuARqhs9WWRR21mB4LearXRvW:Lrz3nnYhhfwc1eCearhvW
                                                                                                                                                                                                                            MD5:94F25D41487F654EF2371FA92544003C
                                                                                                                                                                                                                            SHA1:41A561AA773A21C240F74AF4F14DB7FB2479F630
                                                                                                                                                                                                                            SHA-256:E6A1EEFBCA63DDCE20065B080C202BF63686F473B91F2C64461434AFD071018C
                                                                                                                                                                                                                            SHA-512:281DCBF7852E3B81B3E09A889045C2B4357F684B4F511835A874BC98DEC7D4A77AD1EC1C0FE1D55D9616670278715FBFE9772F2518C3861933F6C392B6A939A4
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN CERTIFICATE-----..MIIFQjCCAyqgAwIBAgIIUfxepT+rr8owDQYJKoZIhvcNAQEMBQAwPzELMAkGA1UE..BhMCS1kxEzARBgNVBAoTCkZhc3Rlc3RWUE4xGzAZBgNVBAMTEkZhc3Rlc3RWUE4g..Um9vdCBDQTAeFw0xNzA5MTYwMDAxNDZaFw0yNzA5MTQwMDAxNDZaMD8xCzAJBgNV..BAYTAktZMRMwEQYDVQQKEwpGYXN0ZXN0VlBOMRswGQYDVQQDExJGYXN0ZXN0VlBO..IFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1Xj+WfPTo..zFynFqc+c3CVrggIllaXEl5bY5VgFynXkqCTM6lSrfC4pNjGXUbqWe6RnGJbM4/6..kUn+lQDjFSQV1rzP2eDS8+r5+X2WXh4AoeNRUWhvSG+HiHD/B2EFK+Nd5BRSdUjp..KWAtsCmT2bBt7nT0jN1OdeNrLJeyF8siAqv/oQzKznF9aIe/N01b2M8ZOFTzoXi2..fZAckgGWui8NB/lzkVIJqSkAPRL8qiJLuRCPVOX1PFD8vV//R8/QumtfbcYBMo6v..Ck2HmWdrh5OQHPxb3KJtbtG+Z1j8x6HGEAe17djYepBiRMyCEQvYgfD6tvFylc4I..quhqE9yaP60PJod5TxpWnRQ6HIGSeBm+S+rYSMalTZ8+pUqOOA+IQCYpfpx6EKIJ..L/VsW2C7cXdvudxDhXPI5lR/QidCb9Ohq3WkfxXaYwzrngdg2avmNqId9R4KESuM..9GoHW0dszfyBCh5wYfeaffMElfDam3B92NUwyhZwtIiv623WVXY9PPz+EDjSJsIA..u2Vi1vdJyA4nD4k9Lwmx/1zTc/UaYVLsiBqL2WdfvFTeoWoV+dNxQXSEPhB8gwi8..x4O4lZW0cwVy/6fa8KMY8gZbcbSTr7U5bRERfW8l+jY+mYK
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PEM certificate
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1912
                                                                                                                                                                                                                            Entropy (8bit):6.013187457463572
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:LrZOGn3n3+NKHqtdSLuARqhs9WWRR21mB4LearXRvW:Lrz3nnYhhfwc1eCearhvW
                                                                                                                                                                                                                            MD5:94F25D41487F654EF2371FA92544003C
                                                                                                                                                                                                                            SHA1:41A561AA773A21C240F74AF4F14DB7FB2479F630
                                                                                                                                                                                                                            SHA-256:E6A1EEFBCA63DDCE20065B080C202BF63686F473B91F2C64461434AFD071018C
                                                                                                                                                                                                                            SHA-512:281DCBF7852E3B81B3E09A889045C2B4357F684B4F511835A874BC98DEC7D4A77AD1EC1C0FE1D55D9616670278715FBFE9772F2518C3861933F6C392B6A939A4
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN CERTIFICATE-----..MIIFQjCCAyqgAwIBAgIIUfxepT+rr8owDQYJKoZIhvcNAQEMBQAwPzELMAkGA1UE..BhMCS1kxEzARBgNVBAoTCkZhc3Rlc3RWUE4xGzAZBgNVBAMTEkZhc3Rlc3RWUE4g..Um9vdCBDQTAeFw0xNzA5MTYwMDAxNDZaFw0yNzA5MTQwMDAxNDZaMD8xCzAJBgNV..BAYTAktZMRMwEQYDVQQKEwpGYXN0ZXN0VlBOMRswGQYDVQQDExJGYXN0ZXN0VlBO..IFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1Xj+WfPTo..zFynFqc+c3CVrggIllaXEl5bY5VgFynXkqCTM6lSrfC4pNjGXUbqWe6RnGJbM4/6..kUn+lQDjFSQV1rzP2eDS8+r5+X2WXh4AoeNRUWhvSG+HiHD/B2EFK+Nd5BRSdUjp..KWAtsCmT2bBt7nT0jN1OdeNrLJeyF8siAqv/oQzKznF9aIe/N01b2M8ZOFTzoXi2..fZAckgGWui8NB/lzkVIJqSkAPRL8qiJLuRCPVOX1PFD8vV//R8/QumtfbcYBMo6v..Ck2HmWdrh5OQHPxb3KJtbtG+Z1j8x6HGEAe17djYepBiRMyCEQvYgfD6tvFylc4I..quhqE9yaP60PJod5TxpWnRQ6HIGSeBm+S+rYSMalTZ8+pUqOOA+IQCYpfpx6EKIJ..L/VsW2C7cXdvudxDhXPI5lR/QidCb9Ohq3WkfxXaYwzrngdg2avmNqId9R4KESuM..9GoHW0dszfyBCh5wYfeaffMElfDam3B92NUwyhZwtIiv623WVXY9PPz+EDjSJsIA..u2Vi1vdJyA4nD4k9Lwmx/1zTc/UaYVLsiBqL2WdfvFTeoWoV+dNxQXSEPhB8gwi8..x4O4lZW0cwVy/6fa8KMY8gZbcbSTr7U5bRERfW8l+jY+mYK
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):618
                                                                                                                                                                                                                            Entropy (8bit):4.532694766524299
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:LrkTt/+xYnhEKMhS64Ar24EgJroQXj2OrcV7TdRwPXYGFc6895C1v:LrkTtcYnhEKoP4AK4EgJkCj2OrnoGFFx
                                                                                                                                                                                                                            MD5:005BF2A1B29FB74EF9ED7402A69D5CD5
                                                                                                                                                                                                                            SHA1:ADEFC73E4B4F34F304E78FD4DB2D3B6AD09C6AF7
                                                                                                                                                                                                                            SHA-256:F7FE79400908B148EB8E8AF16B0F1AFDF7CBCD33DCE23F96177473D0BF11DAFF
                                                                                                                                                                                                                            SHA-512:381CA1E2146A66D1ACC46F7E9F9081962BB96014C10EB5AA0AE60478B8DD902F1975D63AEE18675B95A71D90594338753D8C91CD21ED0939237562E61D0D3D69
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN OpenVPN Static key V1-----..697fe793b32cb5091d30f2326d5d124a..9412e93d0a44ef7361395d76528fcbfc..82c3859dccea70a93cfa8fae409709bf..f75f844cf5ff0c237f426d0c20969233..db0e706edb6bdf195ec3dc11b3f76bc8..07a77e74662d9a800c8cd1144ebb67b7..f0d3f1281d1baf522bfe03b7c3f963b1..364fc0769400e413b61ca7b43ab19fac..9e0f77e41efd4bda7fd77b1de2d7d785..5cbbe3e620cecceac72c21a825b243e6..51f44d90e290e09c3ad650de8fca99c8..58bc7caad584bc69b11e5c9fd9381c69..c505ec487a65912c672d83ed0113b5a7..4ddfbd3ab33b3683cec593557520a72c..4d6cce46111f56f3396cc3ce7183edce..553c68ea0796cf6c4375fad00aaa2a42..-----END OpenVPN Static key V1-----
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):618
                                                                                                                                                                                                                            Entropy (8bit):4.532694766524299
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:LrkTt/+xYnhEKMhS64Ar24EgJroQXj2OrcV7TdRwPXYGFc6895C1v:LrkTtcYnhEKoP4AK4EgJkCj2OrnoGFFx
                                                                                                                                                                                                                            MD5:005BF2A1B29FB74EF9ED7402A69D5CD5
                                                                                                                                                                                                                            SHA1:ADEFC73E4B4F34F304E78FD4DB2D3B6AD09C6AF7
                                                                                                                                                                                                                            SHA-256:F7FE79400908B148EB8E8AF16B0F1AFDF7CBCD33DCE23F96177473D0BF11DAFF
                                                                                                                                                                                                                            SHA-512:381CA1E2146A66D1ACC46F7E9F9081962BB96014C10EB5AA0AE60478B8DD902F1975D63AEE18675B95A71D90594338753D8C91CD21ED0939237562E61D0D3D69
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN OpenVPN Static key V1-----..697fe793b32cb5091d30f2326d5d124a..9412e93d0a44ef7361395d76528fcbfc..82c3859dccea70a93cfa8fae409709bf..f75f844cf5ff0c237f426d0c20969233..db0e706edb6bdf195ec3dc11b3f76bc8..07a77e74662d9a800c8cd1144ebb67b7..f0d3f1281d1baf522bfe03b7c3f963b1..364fc0769400e413b61ca7b43ab19fac..9e0f77e41efd4bda7fd77b1de2d7d785..5cbbe3e620cecceac72c21a825b243e6..51f44d90e290e09c3ad650de8fca99c8..58bc7caad584bc69b11e5c9fd9381c69..c505ec487a65912c672d83ed0113b5a7..4ddfbd3ab33b3683cec593557520a72c..4d6cce46111f56f3396cc3ce7183edce..553c68ea0796cf6c4375fad00aaa2a42..-----END OpenVPN Static key V1-----
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PEM certificate
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1912
                                                                                                                                                                                                                            Entropy (8bit):6.013187457463572
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:LrZOGn3n3+NKHqtdSLuARqhs9WWRR21mB4LearXRvW:Lrz3nnYhhfwc1eCearhvW
                                                                                                                                                                                                                            MD5:94F25D41487F654EF2371FA92544003C
                                                                                                                                                                                                                            SHA1:41A561AA773A21C240F74AF4F14DB7FB2479F630
                                                                                                                                                                                                                            SHA-256:E6A1EEFBCA63DDCE20065B080C202BF63686F473B91F2C64461434AFD071018C
                                                                                                                                                                                                                            SHA-512:281DCBF7852E3B81B3E09A889045C2B4357F684B4F511835A874BC98DEC7D4A77AD1EC1C0FE1D55D9616670278715FBFE9772F2518C3861933F6C392B6A939A4
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN CERTIFICATE-----..MIIFQjCCAyqgAwIBAgIIUfxepT+rr8owDQYJKoZIhvcNAQEMBQAwPzELMAkGA1UE..BhMCS1kxEzARBgNVBAoTCkZhc3Rlc3RWUE4xGzAZBgNVBAMTEkZhc3Rlc3RWUE4g..Um9vdCBDQTAeFw0xNzA5MTYwMDAxNDZaFw0yNzA5MTQwMDAxNDZaMD8xCzAJBgNV..BAYTAktZMRMwEQYDVQQKEwpGYXN0ZXN0VlBOMRswGQYDVQQDExJGYXN0ZXN0VlBO..IFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1Xj+WfPTo..zFynFqc+c3CVrggIllaXEl5bY5VgFynXkqCTM6lSrfC4pNjGXUbqWe6RnGJbM4/6..kUn+lQDjFSQV1rzP2eDS8+r5+X2WXh4AoeNRUWhvSG+HiHD/B2EFK+Nd5BRSdUjp..KWAtsCmT2bBt7nT0jN1OdeNrLJeyF8siAqv/oQzKznF9aIe/N01b2M8ZOFTzoXi2..fZAckgGWui8NB/lzkVIJqSkAPRL8qiJLuRCPVOX1PFD8vV//R8/QumtfbcYBMo6v..Ck2HmWdrh5OQHPxb3KJtbtG+Z1j8x6HGEAe17djYepBiRMyCEQvYgfD6tvFylc4I..quhqE9yaP60PJod5TxpWnRQ6HIGSeBm+S+rYSMalTZ8+pUqOOA+IQCYpfpx6EKIJ..L/VsW2C7cXdvudxDhXPI5lR/QidCb9Ohq3WkfxXaYwzrngdg2avmNqId9R4KESuM..9GoHW0dszfyBCh5wYfeaffMElfDam3B92NUwyhZwtIiv623WVXY9PPz+EDjSJsIA..u2Vi1vdJyA4nD4k9Lwmx/1zTc/UaYVLsiBqL2WdfvFTeoWoV+dNxQXSEPhB8gwi8..x4O4lZW0cwVy/6fa8KMY8gZbcbSTr7U5bRERfW8l+jY+mYK
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PEM certificate
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1912
                                                                                                                                                                                                                            Entropy (8bit):6.013187457463572
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:LrZOGn3n3+NKHqtdSLuARqhs9WWRR21mB4LearXRvW:Lrz3nnYhhfwc1eCearhvW
                                                                                                                                                                                                                            MD5:94F25D41487F654EF2371FA92544003C
                                                                                                                                                                                                                            SHA1:41A561AA773A21C240F74AF4F14DB7FB2479F630
                                                                                                                                                                                                                            SHA-256:E6A1EEFBCA63DDCE20065B080C202BF63686F473B91F2C64461434AFD071018C
                                                                                                                                                                                                                            SHA-512:281DCBF7852E3B81B3E09A889045C2B4357F684B4F511835A874BC98DEC7D4A77AD1EC1C0FE1D55D9616670278715FBFE9772F2518C3861933F6C392B6A939A4
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN CERTIFICATE-----..MIIFQjCCAyqgAwIBAgIIUfxepT+rr8owDQYJKoZIhvcNAQEMBQAwPzELMAkGA1UE..BhMCS1kxEzARBgNVBAoTCkZhc3Rlc3RWUE4xGzAZBgNVBAMTEkZhc3Rlc3RWUE4g..Um9vdCBDQTAeFw0xNzA5MTYwMDAxNDZaFw0yNzA5MTQwMDAxNDZaMD8xCzAJBgNV..BAYTAktZMRMwEQYDVQQKEwpGYXN0ZXN0VlBOMRswGQYDVQQDExJGYXN0ZXN0VlBO..IFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1Xj+WfPTo..zFynFqc+c3CVrggIllaXEl5bY5VgFynXkqCTM6lSrfC4pNjGXUbqWe6RnGJbM4/6..kUn+lQDjFSQV1rzP2eDS8+r5+X2WXh4AoeNRUWhvSG+HiHD/B2EFK+Nd5BRSdUjp..KWAtsCmT2bBt7nT0jN1OdeNrLJeyF8siAqv/oQzKznF9aIe/N01b2M8ZOFTzoXi2..fZAckgGWui8NB/lzkVIJqSkAPRL8qiJLuRCPVOX1PFD8vV//R8/QumtfbcYBMo6v..Ck2HmWdrh5OQHPxb3KJtbtG+Z1j8x6HGEAe17djYepBiRMyCEQvYgfD6tvFylc4I..quhqE9yaP60PJod5TxpWnRQ6HIGSeBm+S+rYSMalTZ8+pUqOOA+IQCYpfpx6EKIJ..L/VsW2C7cXdvudxDhXPI5lR/QidCb9Ohq3WkfxXaYwzrngdg2avmNqId9R4KESuM..9GoHW0dszfyBCh5wYfeaffMElfDam3B92NUwyhZwtIiv623WVXY9PPz+EDjSJsIA..u2Vi1vdJyA4nD4k9Lwmx/1zTc/UaYVLsiBqL2WdfvFTeoWoV+dNxQXSEPhB8gwi8..x4O4lZW0cwVy/6fa8KMY8gZbcbSTr7U5bRERfW8l+jY+mYK
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):618
                                                                                                                                                                                                                            Entropy (8bit):4.532694766524299
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:LrkTt/+xYnhEKMhS64Ar24EgJroQXj2OrcV7TdRwPXYGFc6895C1v:LrkTtcYnhEKoP4AK4EgJkCj2OrnoGFFx
                                                                                                                                                                                                                            MD5:005BF2A1B29FB74EF9ED7402A69D5CD5
                                                                                                                                                                                                                            SHA1:ADEFC73E4B4F34F304E78FD4DB2D3B6AD09C6AF7
                                                                                                                                                                                                                            SHA-256:F7FE79400908B148EB8E8AF16B0F1AFDF7CBCD33DCE23F96177473D0BF11DAFF
                                                                                                                                                                                                                            SHA-512:381CA1E2146A66D1ACC46F7E9F9081962BB96014C10EB5AA0AE60478B8DD902F1975D63AEE18675B95A71D90594338753D8C91CD21ED0939237562E61D0D3D69
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN OpenVPN Static key V1-----..697fe793b32cb5091d30f2326d5d124a..9412e93d0a44ef7361395d76528fcbfc..82c3859dccea70a93cfa8fae409709bf..f75f844cf5ff0c237f426d0c20969233..db0e706edb6bdf195ec3dc11b3f76bc8..07a77e74662d9a800c8cd1144ebb67b7..f0d3f1281d1baf522bfe03b7c3f963b1..364fc0769400e413b61ca7b43ab19fac..9e0f77e41efd4bda7fd77b1de2d7d785..5cbbe3e620cecceac72c21a825b243e6..51f44d90e290e09c3ad650de8fca99c8..58bc7caad584bc69b11e5c9fd9381c69..c505ec487a65912c672d83ed0113b5a7..4ddfbd3ab33b3683cec593557520a72c..4d6cce46111f56f3396cc3ce7183edce..553c68ea0796cf6c4375fad00aaa2a42..-----END OpenVPN Static key V1-----
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):618
                                                                                                                                                                                                                            Entropy (8bit):4.532694766524299
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:LrkTt/+xYnhEKMhS64Ar24EgJroQXj2OrcV7TdRwPXYGFc6895C1v:LrkTtcYnhEKoP4AK4EgJkCj2OrnoGFFx
                                                                                                                                                                                                                            MD5:005BF2A1B29FB74EF9ED7402A69D5CD5
                                                                                                                                                                                                                            SHA1:ADEFC73E4B4F34F304E78FD4DB2D3B6AD09C6AF7
                                                                                                                                                                                                                            SHA-256:F7FE79400908B148EB8E8AF16B0F1AFDF7CBCD33DCE23F96177473D0BF11DAFF
                                                                                                                                                                                                                            SHA-512:381CA1E2146A66D1ACC46F7E9F9081962BB96014C10EB5AA0AE60478B8DD902F1975D63AEE18675B95A71D90594338753D8C91CD21ED0939237562E61D0D3D69
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:-----BEGIN OpenVPN Static key V1-----..697fe793b32cb5091d30f2326d5d124a..9412e93d0a44ef7361395d76528fcbfc..82c3859dccea70a93cfa8fae409709bf..f75f844cf5ff0c237f426d0c20969233..db0e706edb6bdf195ec3dc11b3f76bc8..07a77e74662d9a800c8cd1144ebb67b7..f0d3f1281d1baf522bfe03b7c3f963b1..364fc0769400e413b61ca7b43ab19fac..9e0f77e41efd4bda7fd77b1de2d7d785..5cbbe3e620cecceac72c21a825b243e6..51f44d90e290e09c3ad650de8fca99c8..58bc7caad584bc69b11e5c9fd9381c69..c505ec487a65912c672d83ed0113b5a7..4ddfbd3ab33b3683cec593557520a72c..4d6cce46111f56f3396cc3ce7183edce..553c68ea0796cf6c4375fad00aaa2a42..-----END OpenVPN Static key V1-----
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):321936
                                                                                                                                                                                                                            Entropy (8bit):6.249416182192696
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:49C2dRHqGR0N9BdVLATWWFQEDyhNSDEAIjUoMfqC9ulMdUBIKL:Z2dRHqGRyhAT9FxoSIAIx/C9ulMe2KL
                                                                                                                                                                                                                            MD5:5C1752EF16C7E3B28D9662E3C08FB08F
                                                                                                                                                                                                                            SHA1:4B3F3BE508D4C6CD8374FBB812EE30E99F8128C0
                                                                                                                                                                                                                            SHA-256:1BF45DF354D53D400EAF644E205DADDB0C07B408EB0C03D8CCFF765BD6659FB3
                                                                                                                                                                                                                            SHA-512:296F8AA642527C3A2364B9FA0E1C9F3EE3B7AD6F82D51685F71601F4E4A0E5DA5327FF1E1884F6264E7961417D54028B4E9BBE1B836968FF0F9D6685EBEE0327
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 62%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Z.H.;...;...;..6K...;..6K..q;.......;.......;.......;..6K...;..6K...;...G...;...;...;.......;.......;....p..;.......;..Rich.;..........................PE..d...O.wf.........." ...(.*...........0....................................... ......h1....`..........................................t..t...Du..x................-..............................................(.......@............@...............................text...,(.......*.................. ..`.rdata..rC...@...D..................@..@.data...x7....... ...r..............@....pdata...-..........................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):397712
                                                                                                                                                                                                                            Entropy (8bit):6.40156340476818
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:ThaEhq4cY0f8IlE6BZR2nUx9lYOUgLZUrd:T4EhqR5lE6xSUx9lYOUg6rd
                                                                                                                                                                                                                            MD5:42C063882FD7CEDD3CC62356450D8987
                                                                                                                                                                                                                            SHA1:A09DB77F70A6F7D7C59418FC08250A8E13E8A60D
                                                                                                                                                                                                                            SHA-256:37D1EBFC8F423BF02DEC598C6421E4124C8C5666C27782180D84003039E88DFF
                                                                                                                                                                                                                            SHA-512:77AC9C670F91059B2CAA12DA9B5417CD71D525F900B7DDA51FFCF499AA2882734B342F6803814C6FDE1B527C9742ED9CF67AB1EE8D141CB437B57C979D89B456
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q{.?...l...l...l.j.m...l.j.m...l.j.m...l..m...l..m...l..mY..l.j.m...l.f.m...l...m...l...l...l...m...l...m...l..zl...l...l...l...m...lRich...l........PE..d...j.wf.........." ...(.....L......l........................................0......E.....`..........................................*......x+..........h[.......3........... ..`...............................(...p...@............................................text...|........................... ..`.rdata...o.......p..................@..@.data....?...@...(...2..............@....pdata...3.......4...Z..............@..@.rsrc...h[.......\..................@..@.reloc..`.... ......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):93832
                                                                                                                                                                                                                            Entropy (8bit):5.48517352660103
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:kP2K0pa0WfEYp9Y/XQhpgnbP212YCJpDhiF4O7WGHK/CT:kePOYe4bu1epDh8RWGHK/M
                                                                                                                                                                                                                            MD5:A2ADF4897942B99FE0738F8C37FD15C0
                                                                                                                                                                                                                            SHA1:4192A2221F5C48A16427BF1898C0443CA27A29BB
                                                                                                                                                                                                                            SHA-256:B339B9A93A93B52F3EA0A5F2161E4B16BDA0CA7396D53ECA14C7D7F3E963A3A3
                                                                                                                                                                                                                            SHA-512:DF383B4B70C980C613F3C3EC4E99980DA6DB15F123D617197B644314233D1E2ADEC9F9162D6DBB7B874D885119082E01840102F0976F3CC767A78B5E467EF4A8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X...9...9...9...AF..9...AW..9...A@..9...9..f9...AP.9...AY..9.......9...AG..9...AB..9..Rich.9..........................PE..d.....pK.........."......~...........s.......................................p......r.....@.......... ......................................X}..........p.......T....@.......`......0................................................................................text....|.......~.................. ..`.data...x...........................@....pdata..T...........................@..@.rsrc...p...........................@..@.reloc..p....`.......>..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):316
                                                                                                                                                                                                                            Entropy (8bit):5.3985610361996965
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:kCaFvHBvyXOBS7WFNiKGWxtfGT26BuXFoAyzyFEQRFQ1jt0V09:k9vBv5Y7WCKGWXOT7/+iQjOh0W
                                                                                                                                                                                                                            MD5:259CE13E63C08F5198A5D7337DCCC0C0
                                                                                                                                                                                                                            SHA1:E25C50EFBC8AF1D70BB42C72CB0D0246EBF6BCBC
                                                                                                                                                                                                                            SHA-256:CE97CB0477C8F8F626A50B6935EB817062EC69136443E1F62691700CBC0D4456
                                                                                                                                                                                                                            SHA-512:AD5319E8941E90D9C2FA60AD18B8061CAC31D0EE39DFDC1494E1A2B0A1F57AB661F034E6D60D8421FE07FB395B4FAF4F72B1C3C6E9459277A13961FC5EDB2CCC
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo OFF..@cd /d %~dp0..set OS=windows;....reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && set ARCH=i386 || set ARCH=amd64....for /f "tokens=4-5 delims=. " %%i in ('ver') do set VERSION=%%i.%%j..if "%version%" == "10.0" set OS=windows10......call %OS%\%ARCH%\install_tap.bat
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):302
                                                                                                                                                                                                                            Entropy (8bit):5.3909078265911585
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:6vyXOBS7WFNiKGWxtfGT26BuXFoAyzyFEQRFQ1OoKG9:6v5Y7WCKGWXOT7/+iQjOOo1
                                                                                                                                                                                                                            MD5:6D857A141F9C245E6ACD7012120A0704
                                                                                                                                                                                                                            SHA1:66666950BDB2486C58B1C2D11132A98BF3A54EA8
                                                                                                                                                                                                                            SHA-256:992D1891016B4C45BACB4DB700195096F438BB10070484D63088F52E8063EEF7
                                                                                                                                                                                                                            SHA-512:8ACE3FA96B4FDA7B036A12EBF8DFC3E8C1FFCF212ED8F2A60FEB64806C26AABF926FF3D02D656EECE10B6F760F846E4196A9116FFF83BC00408697F7C3EEE180
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo OFF..set OS=windows;....reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && set ARCH=i386 || set ARCH=amd64....for /f "tokens=4-5 delims=. " %%i in ('ver') do set VERSION=%%i.%%j..if "%version%" == "10.0" set OS=windows10....call %OS%\%ARCH%\uninstall_tap.bat
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):316
                                                                                                                                                                                                                            Entropy (8bit):5.3985610361996965
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:kCaFvHBvyXOBS7WFNiKGWxtfGT26BuXFoAyzyFEQRFQ1jt0V09:k9vBv5Y7WCKGWXOT7/+iQjOh0W
                                                                                                                                                                                                                            MD5:259CE13E63C08F5198A5D7337DCCC0C0
                                                                                                                                                                                                                            SHA1:E25C50EFBC8AF1D70BB42C72CB0D0246EBF6BCBC
                                                                                                                                                                                                                            SHA-256:CE97CB0477C8F8F626A50B6935EB817062EC69136443E1F62691700CBC0D4456
                                                                                                                                                                                                                            SHA-512:AD5319E8941E90D9C2FA60AD18B8061CAC31D0EE39DFDC1494E1A2B0A1F57AB661F034E6D60D8421FE07FB395B4FAF4F72B1C3C6E9459277A13961FC5EDB2CCC
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo OFF..@cd /d %~dp0..set OS=windows;....reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && set ARCH=i386 || set ARCH=amd64....for /f "tokens=4-5 delims=. " %%i in ('ver') do set VERSION=%%i.%%j..if "%version%" == "10.0" set OS=windows10......call %OS%\%ARCH%\install_tap.bat
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):302
                                                                                                                                                                                                                            Entropy (8bit):5.3909078265911585
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:6vyXOBS7WFNiKGWxtfGT26BuXFoAyzyFEQRFQ1OoKG9:6v5Y7WCKGWXOT7/+iQjOOo1
                                                                                                                                                                                                                            MD5:6D857A141F9C245E6ACD7012120A0704
                                                                                                                                                                                                                            SHA1:66666950BDB2486C58B1C2D11132A98BF3A54EA8
                                                                                                                                                                                                                            SHA-256:992D1891016B4C45BACB4DB700195096F438BB10070484D63088F52E8063EEF7
                                                                                                                                                                                                                            SHA-512:8ACE3FA96B4FDA7B036A12EBF8DFC3E8C1FFCF212ED8F2A60FEB64806C26AABF926FF3D02D656EECE10B6F760F846E4196A9116FFF83BC00408697F7C3EEE180
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo OFF..set OS=windows;....reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && set ARCH=i386 || set ARCH=amd64....for /f "tokens=4-5 delims=. " %%i in ('ver') do set VERSION=%%i.%%j..if "%version%" == "10.0" set OS=windows10....call %OS%\%ARCH%\uninstall_tap.bat
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10711
                                                                                                                                                                                                                            Entropy (8bit):7.2254581318251425
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:PqDhDNF748XJCO39JnxrEwJqKkhYCxXA6qnaj/rHr:OXPJxXxkh3xXhlzX
                                                                                                                                                                                                                            MD5:225E7BA0E5E2D46813E5C858A4D0D5B0
                                                                                                                                                                                                                            SHA1:5DD49014764F634164520583FD0CEC87AB1A1625
                                                                                                                                                                                                                            SHA-256:B0BAF5CB84FA4ACB34B77A6231052061DA6B8676D216833724B7A602622161FB
                                                                                                                                                                                                                            SHA-512:9C77ADF7E71ACA94489DFEB536F796A017B7C05771962274BAE2C614E2AE6799CCEB36CC58AC470184C37F52DEAC75988BB14E6A329F432C6D7CEDBCA18272A8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.)...*.H........).0.)....1.0...`.H.e......0..M..+.....7.....>0..:0...+.....7..........dG.'$....g..191023085812Z0...+.....7.....0..T0.... .}..ID.U..;.t.`.U..h.z.F.......K1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... .}..ID.U..;.t.`.U..h.z.F.......K0....._Ne...=.....N.._-%1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.....D.......L..S.4..b.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... .?;..{.x....H..4...k).VB.......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... .?;..{.x....H..4...k).VB...........0...0....+.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):507728
                                                                                                                                                                                                                            Entropy (8bit):6.351404653031349
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:6VF7vR03+4YnfLU6wXnSmZb3lKm34AJ9Qvtk1Ai8mTnu5gtZXqg7VcoyUyHi6/Cw:6VXU/3TNfAkTnrZqkyh/agGxwNdUo1h
                                                                                                                                                                                                                            MD5:E313336C82EB265542664CC7A360C5FF
                                                                                                                                                                                                                            SHA1:184211A456E09AC606DB76F814332CC912C0F5EB
                                                                                                                                                                                                                            SHA-256:B6B33F4CD19C606E4C616F08C11FD4AE775ACCB24B78EF66EB31C279CA403381
                                                                                                                                                                                                                            SHA-512:F156F2F55AF7026F5B3D2C5634806C5764FD230521D71969E80BBF6F6571730636DD5F6FE6C1138FA742E12003E5CC5F7D82E729EF7506057F8B510384E52386
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N....cv..cv..cv.Q.r..cv.Q.u..cv.Q.s..cv...s.#cv...r..cv...u..cv.Q.w..cv..cw..cv.~.s..cv.~....cv..c...cv.~.t..cv.Rich.cv.................PE..d......].........."......*...d.......z.........@..........................................`..................................................S..x............... L...x..PG......D.......T............................................@...............................text....).......*.................. ..`.rdata...%...@...&..................@..@.data....(...p.......T..............@....pdata.. L.......N...d..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D............n..............@..B................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10711
                                                                                                                                                                                                                            Entropy (8bit):7.2254581318251425
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:PqDhDNF748XJCO39JnxrEwJqKkhYCxXA6qnaj/rHr:OXPJxXxkh3xXhlzX
                                                                                                                                                                                                                            MD5:225E7BA0E5E2D46813E5C858A4D0D5B0
                                                                                                                                                                                                                            SHA1:5DD49014764F634164520583FD0CEC87AB1A1625
                                                                                                                                                                                                                            SHA-256:B0BAF5CB84FA4ACB34B77A6231052061DA6B8676D216833724B7A602622161FB
                                                                                                                                                                                                                            SHA-512:9C77ADF7E71ACA94489DFEB536F796A017B7C05771962274BAE2C614E2AE6799CCEB36CC58AC470184C37F52DEAC75988BB14E6A329F432C6D7CEDBCA18272A8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.)...*.H........).0.)....1.0...`.H.e......0..M..+.....7.....>0..:0...+.....7..........dG.'$....g..191023085812Z0...+.....7.....0..T0.... .}..ID.U..;.t.`.U..h.z.F.......K1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... .}..ID.U..;.t.`.U..h.z.F.......K0....._Ne...=.....N.._-%1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.....D.......L..S.4..b.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... .?;..{.x....H..4...k).VB.......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... .?;..{.x....H..4...k).VB...........0...0....+.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):507728
                                                                                                                                                                                                                            Entropy (8bit):6.351404653031349
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:6VF7vR03+4YnfLU6wXnSmZb3lKm34AJ9Qvtk1Ai8mTnu5gtZXqg7VcoyUyHi6/Cw:6VXU/3TNfAkTnrZqkyh/agGxwNdUo1h
                                                                                                                                                                                                                            MD5:E313336C82EB265542664CC7A360C5FF
                                                                                                                                                                                                                            SHA1:184211A456E09AC606DB76F814332CC912C0F5EB
                                                                                                                                                                                                                            SHA-256:B6B33F4CD19C606E4C616F08C11FD4AE775ACCB24B78EF66EB31C279CA403381
                                                                                                                                                                                                                            SHA-512:F156F2F55AF7026F5B3D2C5634806C5764FD230521D71969E80BBF6F6571730636DD5F6FE6C1138FA742E12003E5CC5F7D82E729EF7506057F8B510384E52386
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N....cv..cv..cv.Q.r..cv.Q.u..cv.Q.s..cv...s.#cv...r..cv...u..cv.Q.w..cv..cw..cv.~.s..cv.~....cv..c...cv.~.t..cv.Rich.cv.................PE..d......].........."......*...d.......z.........@..........................................`..................................................S..x............... L...x..PG......D.......T............................................@...............................text....).......*.................. ..`.rdata...%...@...&..................@..@.data....(...p.......T..............@....pdata.. L.......N...d..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D............n..............@..B................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7533
                                                                                                                                                                                                                            Entropy (8bit):5.046821594517318
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlP2bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGTxzo3DcNSj6jvKFkinuEQTXvzaZ
                                                                                                                                                                                                                            MD5:3A541F2BF9842CDE6F0C95E83DE14FFA
                                                                                                                                                                                                                            SHA1:12C074F03AA19968893F2BE48FDEF42A293B7EE4
                                                                                                                                                                                                                            SHA-256:598EAD8481136AB0C8C99E67CA30841DB3C32417B45D6FEEDE04802DB0C4C320
                                                                                                                                                                                                                            SHA-512:F060851D26E978AFA6AC632E74C221FB837FDEEE7752762BEE210D7BE144195A27514E108EF8C19A642BC03486E94721BD1B9D4AC69DB26BD892DCAA7894D3D2
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (native) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):35008
                                                                                                                                                                                                                            Entropy (8bit):6.574406479237283
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:nNoBjjOOA4dR/uEvBbuALxQbaxJxh639o:No9jyGu+BxLObev6No
                                                                                                                                                                                                                            MD5:77E134EBCD2C8EA7D217EBD61DAAA7B6
                                                                                                                                                                                                                            SHA1:F907526D7F1ED81A6F05BA040DE9E5DBEA421C52
                                                                                                                                                                                                                            SHA-256:CDC110B59A650CF576D7E059DDB1E171BDE50789DD14ABE1199340312177EEDE
                                                                                                                                                                                                                            SHA-512:57C6FFBB7D6D45EB461E2EAFDFA7B01FAAD0130511ED0C07931112FB72F7B1B18829BE3EBF1577DE4337B271F13C5F16528E588807F47A5B483A9BB4BFE6790C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C..."..."..."...J..."...J..."...J..."..."..."...J..."...I..."...I."...I..."..Rich."..................PE..L...g..].................N...................P....@.......................................@A....................................P.......X............d...$.......... R..8...........................XR..@............P...............................text....7.......8.................. ..h.rdata..,....P.......<..............@..H.data........`.......B..............@...PAGE....[....p.......D.............. ..`INIT....T............P.............. ..b.rsrc...X............Z..............@..B.reloc...............`..............@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7533
                                                                                                                                                                                                                            Entropy (8bit):5.046821594517318
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlP2bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGTxzo3DcNSj6jvKFkinuEQTXvzaZ
                                                                                                                                                                                                                            MD5:3A541F2BF9842CDE6F0C95E83DE14FFA
                                                                                                                                                                                                                            SHA1:12C074F03AA19968893F2BE48FDEF42A293B7EE4
                                                                                                                                                                                                                            SHA-256:598EAD8481136AB0C8C99E67CA30841DB3C32417B45D6FEEDE04802DB0C4C320
                                                                                                                                                                                                                            SHA-512:F060851D26E978AFA6AC632E74C221FB837FDEEE7752762BEE210D7BE144195A27514E108EF8C19A642BC03486E94721BD1B9D4AC69DB26BD892DCAA7894D3D2
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):396840
                                                                                                                                                                                                                            Entropy (8bit):6.504700092936786
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:mkska7m3uFm4uy6b10MtxnOrPdmBe3oIkm:mAawb109dmBK5
                                                                                                                                                                                                                            MD5:D680D27DCC19546B721F731384EE56DD
                                                                                                                                                                                                                            SHA1:B418C1B8CB5E8259F9C8CBED29676AD101A15425
                                                                                                                                                                                                                            SHA-256:E64E59A011D45C5D9D93AC79305A060244796040FCFBA112D7F8218F945C7602
                                                                                                                                                                                                                            SHA-512:B495D60E97A782EDA01833F3A45AC03E5F2E6E629D7117ED34E6EA411E85FD8A012C21BD793ED59D7B352F3AA7552209F46203680974CCB57D003A1C690F476B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........b...1...1...1..0...1..0{..1..0.1C.0..1C.0.1C.0.1..0...1...1b..1..0...1..p1...1...1...1..0...1Rich...1........PE..L......].................<..........`m.......P....@.......................................@.....................................x.......................(H.......$......T...........................(...@............P..h............................text....;.......<.................. ..`.rdata..J....P.......@..............@..@.data...l...........................@....rsrc...............................@..@.reloc...$.......&..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10866
                                                                                                                                                                                                                            Entropy (8bit):7.241389894622462
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:LBDMDT23rJCeS39JnxrEwJqKkhYC9jOVKEwkqnajNkwIetug:LXdoJxXxkh39qVKtklJGNg
                                                                                                                                                                                                                            MD5:6A3C291EB986A23B427ECF92779C6902
                                                                                                                                                                                                                            SHA1:C96B9791A0F5AC27F84E2F3E06E64C8513168477
                                                                                                                                                                                                                            SHA-256:C996AA42A022F1DE293F14445FEC7038A7CDC6AA2C4632C5CCA07ED53F88F762
                                                                                                                                                                                                                            SHA-512:1FC247B10FB3717344174FC66EDD6ACC5DF171EDF9F70081715CA4C62499D6673B777B635EA043B397F6933201150E8D8EE28309BFA7F6F96326562D43BB6640
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.*n..*.H........*_0.*[...1.0...`.H.e......0.....+.....7......0...0...+.....7.....atM...lN....n>....191023090129Z0...+.....7.....0..T0......t.:..h.?+...*);~.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.... Y.....j...g.0....$..]o....-... 1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... Y.....j...g.0....$..]o....-... 0.......R.....Q.8Y....1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... ..xq....X.QO@....|s6..*.xV. .,.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... ..xq....X.QO@....|s6..*.xV. .,...e0..a0....+.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10866
                                                                                                                                                                                                                            Entropy (8bit):7.241389894622462
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:LBDMDT23rJCeS39JnxrEwJqKkhYC9jOVKEwkqnajNkwIetug:LXdoJxXxkh39qVKtklJGNg
                                                                                                                                                                                                                            MD5:6A3C291EB986A23B427ECF92779C6902
                                                                                                                                                                                                                            SHA1:C96B9791A0F5AC27F84E2F3E06E64C8513168477
                                                                                                                                                                                                                            SHA-256:C996AA42A022F1DE293F14445FEC7038A7CDC6AA2C4632C5CCA07ED53F88F762
                                                                                                                                                                                                                            SHA-512:1FC247B10FB3717344174FC66EDD6ACC5DF171EDF9F70081715CA4C62499D6673B777B635EA043B397F6933201150E8D8EE28309BFA7F6F96326562D43BB6640
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.*n..*.H........*_0.*[...1.0...`.H.e......0.....+.....7......0...0...+.....7.....atM...lN....n>....191023090129Z0...+.....7.....0..T0......t.:..h.?+...*);~.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.... Y.....j...g.0....$..]o....-... 1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... Y.....j...g.0....$..]o....-... 0.......R.....Q.8Y....1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... ..xq....X.QO@....|s6..*.xV. .,.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... ..xq....X.QO@....|s6..*.xV. .,...e0..a0....+.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (native) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):35008
                                                                                                                                                                                                                            Entropy (8bit):6.574406479237283
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:nNoBjjOOA4dR/uEvBbuALxQbaxJxh639o:No9jyGu+BxLObev6No
                                                                                                                                                                                                                            MD5:77E134EBCD2C8EA7D217EBD61DAAA7B6
                                                                                                                                                                                                                            SHA1:F907526D7F1ED81A6F05BA040DE9E5DBEA421C52
                                                                                                                                                                                                                            SHA-256:CDC110B59A650CF576D7E059DDB1E171BDE50789DD14ABE1199340312177EEDE
                                                                                                                                                                                                                            SHA-512:57C6FFBB7D6D45EB461E2EAFDFA7B01FAAD0130511ED0C07931112FB72F7B1B18829BE3EBF1577DE4337B271F13C5F16528E588807F47A5B483A9BB4BFE6790C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C..."..."..."...J..."...J..."...J..."..."..."...J..."...I..."...I."...I..."..Rich."..................PE..L...g..].................N...................P....@.......................................@A....................................P.......X............d...$.......... R..8...........................XR..@............P...............................text....7.......8.................. ..h.rdata..,....P.......<..............@..H.data........`.......B..............@...PAGE....[....p.......D.............. ..`INIT....T............P.............. ..b.rsrc...X............Z..............@..B.reloc...............`..............@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):396840
                                                                                                                                                                                                                            Entropy (8bit):6.504700092936786
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:mkska7m3uFm4uy6b10MtxnOrPdmBe3oIkm:mAawb109dmBK5
                                                                                                                                                                                                                            MD5:D680D27DCC19546B721F731384EE56DD
                                                                                                                                                                                                                            SHA1:B418C1B8CB5E8259F9C8CBED29676AD101A15425
                                                                                                                                                                                                                            SHA-256:E64E59A011D45C5D9D93AC79305A060244796040FCFBA112D7F8218F945C7602
                                                                                                                                                                                                                            SHA-512:B495D60E97A782EDA01833F3A45AC03E5F2E6E629D7117ED34E6EA411E85FD8A012C21BD793ED59D7B352F3AA7552209F46203680974CCB57D003A1C690F476B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........b...1...1...1..0...1..0{..1..0.1C.0..1C.0.1C.0.1..0...1...1b..1..0...1..p1...1...1...1..0...1Rich...1........PE..L......].................<..........`m.......P....@.......................................@.....................................x.......................(H.......$......T...........................(...@............P..h............................text....;.......<.................. ..`.rdata..J....P.......@..............@..@.data...l...........................@....rsrc...............................@..@.reloc...$.......&..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39384
                                                                                                                                                                                                                            Entropy (8bit):6.220766637489946
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:7CxLEO/+ApBG35KBOXZZoZmTf11a+uiExMFYQjEPKgz:NCI46R1a+jExMFFjWR
                                                                                                                                                                                                                            MD5:2CCA8DC5DA7F197C8C97A2EEBCBFA908
                                                                                                                                                                                                                            SHA1:1A463168F91A6AE254A3E99CE2691F9E7DBC2D46
                                                                                                                                                                                                                            SHA-256:AA1EA00EA7D1FD8E404FB5FEFF948CFB86642F803BDF23D8262B8A0C1151B643
                                                                                                                                                                                                                            SHA-512:AFBF92EA4A3C21048DC25FDC59779A0F20D6687CE9B2D0291268ED2D82A7020595AF2633EAE8623706162C36B24F6E8E70FA73F9D1088E2AB91BA8EAFB8E948F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d....z.].........."......Z.....................@....................................:.....`A....................................................<.......X....p..H....x...!...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):498504
                                                                                                                                                                                                                            Entropy (8bit):6.313132779768202
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:iVF7vR03+4YnfLU6wXnSmZb3lKm34AJ9Qvtk1Ai8mTnu5gtZXqg7VcoyUyHi6/Cz:iVXU/3TNfAkTnrZqkyh/agGKwNdUo15
                                                                                                                                                                                                                            MD5:F19CFFFF76FF48E98F060A563DD8345B
                                                                                                                                                                                                                            SHA1:C77F3FE9FFBA02DE288661FBB66656791196EDBC
                                                                                                                                                                                                                            SHA-256:16D1FF6409065D9C0BC50FC2ADE61B3299A141CF2553749D8891BEDBEA43DE70
                                                                                                                                                                                                                            SHA-512:0D4A53FA4B0D4FF71AF1FFF5888005570404BF5309942F477B1D754073F6D200ABADE20DAAFFA3FB6DA55F2B23588CA439273BD9268257B83B00F973B7B61841
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N....cv..cv..cv.Q.r..cv.Q.u..cv.Q.s..cv...s.#cv...r..cv...u..cv.Q.w..cv..cw..cv.~.s..cv.~....cv..c...cv.~.t..cv.Rich.cv.................PE..d....z.].........."......*...d.......z.........@..........................................`..................................................S..x............... L...x..H#......D.......T............................................@...............................text....).......*.................. ..`.rdata...%...@...&..................@..@.data....(...p.......T..............@....pdata.. L.......N...d..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D............n..............@..B................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10042
                                                                                                                                                                                                                            Entropy (8bit):7.139091215265505
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:rrIa34E9odZubhd95wRLeOup+ZscF8Bd1LEqsa9sgfxIZH54o:nCZYQA9+ZsHLEhDgf2h54o
                                                                                                                                                                                                                            MD5:685D08D5E2A2450648A40B518E2046FC
                                                                                                                                                                                                                            SHA1:D99E38968DE1CA1850971A2B81BFDAB49626AAED
                                                                                                                                                                                                                            SHA-256:56A658934ACC55AD665D685AE05913B4710E053A8FD385C0798B96041DA161B2
                                                                                                                                                                                                                            SHA-512:619D08317328B351FEEA51C08C57B4704EEA0A92836D6ED3BE850478EA6A9C2A14DFA30C763581608E16983010AB2E12B51E3BEC68F3480EE45A04C0E857FDB7
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.'6..*.H........''0.'#...1.0...`.H.e......0..Z..+.....7.....K0..G0...+.....7........N.u.C...y].7...191031061137Z0...+.....7.....0...0....R0.5.1.7.3.7.1.7.7.5.6.C.F.1.9.7.8.D.3.7.8.6.4.5.A.D.A.C.6.D.6.F.3.3.5.3.C.7.C.B...1../0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........7.ul.7.E..mo3S..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....RD.8.5.F.4.E.6.5.F.E.1.0.F.1.3.D.E.D.1.7.8.0.D.D.B.D.0.7.4.E.D.F.C.7.5.F.2.D.2.5...1..)0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0E..+.....7...17050...+.....7.......0!0...+........._Ne...=.....N.._-%0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}.......0..0v..+.....7....h0f...O.S.......XV.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10042
                                                                                                                                                                                                                            Entropy (8bit):7.139091215265505
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:rrIa34E9odZubhd95wRLeOup+ZscF8Bd1LEqsa9sgfxIZH54o:nCZYQA9+ZsHLEhDgf2h54o
                                                                                                                                                                                                                            MD5:685D08D5E2A2450648A40B518E2046FC
                                                                                                                                                                                                                            SHA1:D99E38968DE1CA1850971A2B81BFDAB49626AAED
                                                                                                                                                                                                                            SHA-256:56A658934ACC55AD665D685AE05913B4710E053A8FD385C0798B96041DA161B2
                                                                                                                                                                                                                            SHA-512:619D08317328B351FEEA51C08C57B4704EEA0A92836D6ED3BE850478EA6A9C2A14DFA30C763581608E16983010AB2E12B51E3BEC68F3480EE45A04C0E857FDB7
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.'6..*.H........''0.'#...1.0...`.H.e......0..Z..+.....7.....K0..G0...+.....7........N.u.C...y].7...191031061137Z0...+.....7.....0...0....R0.5.1.7.3.7.1.7.7.5.6.C.F.1.9.7.8.D.3.7.8.6.4.5.A.D.A.C.6.D.6.F.3.3.5.3.C.7.C.B...1../0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........7.ul.7.E..mo3S..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....RD.8.5.F.4.E.6.5.F.E.1.0.F.1.3.D.E.D.1.7.8.0.D.D.B.D.0.7.4.E.D.F.C.7.5.F.2.D.2.5...1..)0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0E..+.....7...17050...+.....7.......0!0...+........._Ne...=.....N.._-%0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}.......0..0v..+.....7....h0f...O.S.......XV.i.s.t.a.X.6.4.,.S.e.r.v.e.r.2.0.0.8.X.6.4.,
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39384
                                                                                                                                                                                                                            Entropy (8bit):6.220766637489946
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:7CxLEO/+ApBG35KBOXZZoZmTf11a+uiExMFYQjEPKgz:NCI46R1a+jExMFFjWR
                                                                                                                                                                                                                            MD5:2CCA8DC5DA7F197C8C97A2EEBCBFA908
                                                                                                                                                                                                                            SHA1:1A463168F91A6AE254A3E99CE2691F9E7DBC2D46
                                                                                                                                                                                                                            SHA-256:AA1EA00EA7D1FD8E404FB5FEFF948CFB86642F803BDF23D8262B8A0C1151B643
                                                                                                                                                                                                                            SHA-512:AFBF92EA4A3C21048DC25FDC59779A0F20D6687CE9B2D0291268ED2D82A7020595AF2633EAE8623706162C36B24F6E8E70FA73F9D1088E2AB91BA8EAFB8E948F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d....z.].........."......Z.....................@....................................:.....`A....................................................<.......X....p..H....x...!...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):498504
                                                                                                                                                                                                                            Entropy (8bit):6.313132779768202
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:iVF7vR03+4YnfLU6wXnSmZb3lKm34AJ9Qvtk1Ai8mTnu5gtZXqg7VcoyUyHi6/Cz:iVXU/3TNfAkTnrZqkyh/agGKwNdUo15
                                                                                                                                                                                                                            MD5:F19CFFFF76FF48E98F060A563DD8345B
                                                                                                                                                                                                                            SHA1:C77F3FE9FFBA02DE288661FBB66656791196EDBC
                                                                                                                                                                                                                            SHA-256:16D1FF6409065D9C0BC50FC2ADE61B3299A141CF2553749D8891BEDBEA43DE70
                                                                                                                                                                                                                            SHA-512:0D4A53FA4B0D4FF71AF1FFF5888005570404BF5309942F477B1D754073F6D200ABADE20DAAFFA3FB6DA55F2B23588CA439273BD9268257B83B00F973B7B61841
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N....cv..cv..cv.Q.r..cv.Q.u..cv.Q.s..cv...s.#cv...r..cv...u..cv.Q.w..cv..cw..cv.~.s..cv.~....cv..c...cv.~.t..cv.Rich.cv.................PE..d....z.].........."......*...d.......z.........@..........................................`..................................................S..x............... L...x..H#......D.......T............................................@...............................text....).......*.................. ..`.rdata...%...@...&..................@..@.data....(...p.......T..............@....pdata.. L.......N...d..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..D............n..............@..B................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7533
                                                                                                                                                                                                                            Entropy (8bit):5.046821594517318
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlP2bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGTxzo3DcNSj6jvKFkinuEQTXvzaZ
                                                                                                                                                                                                                            MD5:3A541F2BF9842CDE6F0C95E83DE14FFA
                                                                                                                                                                                                                            SHA1:12C074F03AA19968893F2BE48FDEF42A293B7EE4
                                                                                                                                                                                                                            SHA-256:598EAD8481136AB0C8C99E67CA30841DB3C32417B45D6FEEDE04802DB0C4C320
                                                                                                                                                                                                                            SHA-512:F060851D26E978AFA6AC632E74C221FB837FDEEE7752762BEE210D7BE144195A27514E108EF8C19A642BC03486E94721BD1B9D4AC69DB26BD892DCAA7894D3D2
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):228
                                                                                                                                                                                                                            Entropy (8bit):4.832057381123706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:hiPFvPuaYkVVkZ0BNLllYYLV3GZ0Q/RLQ8NGN8BP:E9HuaYcyZcNLllYbZh/a8NGNc
                                                                                                                                                                                                                            MD5:939DFFC36D36E4C85EE6703C812987E5
                                                                                                                                                                                                                            SHA1:3BA5F451B1F5C269B4F51E847DA79A3C619CB9C9
                                                                                                                                                                                                                            SHA-256:843C2DFB5FE8DFE7C5266F8F79D1E0AC0BA3E40D5C883D4AF879B6F273B7499E
                                                                                                                                                                                                                            SHA-512:8958432897981533C2822AC7355D56FC490EB89157423FAA5DF13A5EC00E75A9E791A3ECF478561C3B13988C553FD739FD2047C37EF91972DBF61AB55D475314
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing old TAP driver.....tapinstall.exe remove tap0901 ..echo Installing TAP driver.....tapinstall.exe install OemVista.inf tap0901 ..echo TAP Driver Re-Installation completed successfully!..exit
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10010
                                                                                                                                                                                                                            Entropy (8bit):7.143392930093258
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:bdOUGdndfdZubhd95wRLeOup+ZscF8Bd1LELx8a9sgfxIZH3:p7oFZYQA9+ZsHLE98Dgf2h3
                                                                                                                                                                                                                            MD5:BEE546D1A9EE2F74F4C9B0A347DBAB7C
                                                                                                                                                                                                                            SHA1:BB655AEDDFACE5C498DC8EC5A3E68685FDFE6D50
                                                                                                                                                                                                                            SHA-256:DBC0D9D157718C90227D527A9BFC87C9135426A7A1A7C0ECD3F43825AAA2EE0E
                                                                                                                                                                                                                            SHA-512:B68F5F6572BB881B116746AB1BF90AE1E16449E0797D482B1D5A551241ED37A30EF105AECA7B1CEB62CB38962B285D29159B9E68DC1BC3B457B2A14531A80F44
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.'...*.H........'.0.'....1.0...`.H.e......0..:..+.....7.....+0..'0...+.....7.....\.6.D..E..Wm(.p...191031061137Z0...+.....7.....0...0....R1.2.C.0.7.4.F.0.3.A.A.1.9.9.6.8.8.9.3.F.2.B.E.4.8.F.D.E.F.4.2.A.2.9.3.B.7.E.E.4...1..)0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0E..+.....7...17050...+.....7.......0!0...+..........t.:..h.?+...*);~.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....RA.F.B.A.B.0.D.E.D.C.D.F.C.2.1.F.3.6.4.E.D.0.2.4.6.9.0.4.8.1.A.F.D.C.8.D.3.6.E.1...1../0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0M..+.....7...1?0=0...+.....7...0...........0!0...+................6N.$i....6.0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}.......0..0V..+.....7....H0F...O.S.......8V.i.s.t.a.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (native) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):34264
                                                                                                                                                                                                                            Entropy (8bit):6.451114076364161
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:nToflu9IisjjMJvOA4hKtbAwut9l/AxkDur/MvBhLwI7PKA+bkxQJ7XakZSZ4dS5:nToBjjOOA4dR/uQvBbuALxQbagPKgzW
                                                                                                                                                                                                                            MD5:EF55CAAABD0E13C304587D941C343F77
                                                                                                                                                                                                                            SHA1:F0E323EF510E00FC925A7FB37C625D077FECA8A3
                                                                                                                                                                                                                            SHA-256:A4E2E4194E15BC93A53FFAB121CCE22CC76EDBC18DFB83132A95F92C9220509F
                                                                                                                                                                                                                            SHA-512:D2C61CCB73C90D26A4D39EBADE87A6F7F23CAA34B29AE14FFA08CA48A32086C6553CA12D38362B6179E82776F3D76F4B05FDD2238B5E7BE4FEEC98A4D8D52573
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C..."..."..."...J..."...J..."...J..."..."..."...J..."...I..."...I."...I..."..Rich."..................PE..L....z.].................N...................P....@.......................................@A....................................P.......X............d...!.......... R..8...........................XR..@............P...............................text....7.......8.................. ..h.rdata..,....P.......<..............@..H.data........`.......B..............@...PAGE....[....p.......D.............. ..`INIT....T............P.............. ..b.rsrc...X............Z..............@..B.reloc...............`..............@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):387400
                                                                                                                                                                                                                            Entropy (8bit):6.458236487570103
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:UTksWxn+v8a7/e3uFm4uy6b1aptMtx1IAOrPdmB4SS4Vw3VTBZiA916NkW:Akska7m3uFm4uy6b10MtxnOrPdmBe3XE
                                                                                                                                                                                                                            MD5:46F33BBA03FF35C0A777B5875E832559
                                                                                                                                                                                                                            SHA1:C4B5487307DB1B715EDA5C233DBD346EF44ABF02
                                                                                                                                                                                                                            SHA-256:72D329B11A240403A74990F7F05CDDA684F53FBFC1E45EE3E565E38000C6FDA1
                                                                                                                                                                                                                            SHA-512:7130F9DEE420D2A377E3CDAE0C47D1F8446E2DA4E021274A15F4FD00583F79C0DBF05819216ABBAAE5493BF1CB1E4FA08EFA673CCDA1BC3A623BAEC828DFC413
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........b...1...1...1..0...1..0{..1..0.1C.0..1C.0.1C.0.1..0...1...1b..1..0...1..p1...1...1...1..0...1Rich...1........PE..L....z.].................<..........`m.......P....@.................................~.....@.....................................x.......................H#.......$......T...........................(...@............P..h............................text....;.......<.................. ..`.rdata..J....P.......@..............@..@.data...l...........................@....rsrc...............................@..@.reloc...$.......&..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7533
                                                                                                                                                                                                                            Entropy (8bit):5.046821594517318
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlP2bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGTxzo3DcNSj6jvKFkinuEQTXvzaZ
                                                                                                                                                                                                                            MD5:3A541F2BF9842CDE6F0C95E83DE14FFA
                                                                                                                                                                                                                            SHA1:12C074F03AA19968893F2BE48FDEF42A293B7EE4
                                                                                                                                                                                                                            SHA-256:598EAD8481136AB0C8C99E67CA30841DB3C32417B45D6FEEDE04802DB0C4C320
                                                                                                                                                                                                                            SHA-512:F060851D26E978AFA6AC632E74C221FB837FDEEE7752762BEE210D7BE144195A27514E108EF8C19A642BC03486E94721BD1B9D4AC69DB26BD892DCAA7894D3D2
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10010
                                                                                                                                                                                                                            Entropy (8bit):7.143392930093258
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:bdOUGdndfdZubhd95wRLeOup+ZscF8Bd1LELx8a9sgfxIZH3:p7oFZYQA9+ZsHLE98Dgf2h3
                                                                                                                                                                                                                            MD5:BEE546D1A9EE2F74F4C9B0A347DBAB7C
                                                                                                                                                                                                                            SHA1:BB655AEDDFACE5C498DC8EC5A3E68685FDFE6D50
                                                                                                                                                                                                                            SHA-256:DBC0D9D157718C90227D527A9BFC87C9135426A7A1A7C0ECD3F43825AAA2EE0E
                                                                                                                                                                                                                            SHA-512:B68F5F6572BB881B116746AB1BF90AE1E16449E0797D482B1D5A551241ED37A30EF105AECA7B1CEB62CB38962B285D29159B9E68DC1BC3B457B2A14531A80F44
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.'...*.H........'.0.'....1.0...`.H.e......0..:..+.....7.....+0..'0...+.....7.....\.6.D..E..Wm(.p...191031061137Z0...+.....7.....0...0....R1.2.C.0.7.4.F.0.3.A.A.1.9.9.6.8.8.9.3.F.2.B.E.4.8.F.D.E.F.4.2.A.2.9.3.B.7.E.E.4...1..)0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0E..+.....7...17050...+.....7.......0!0...+..........t.:..h.?+...*);~.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....RA.F.B.A.B.0.D.E.D.C.D.F.C.2.1.F.3.6.4.E.D.0.2.4.6.9.0.4.8.1.A.F.D.C.8.D.3.6.E.1...1../0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0>..+.....7...100....O.S.A.t.t.r........2.:.6...0.,.2.:.6...1...0M..+.....7...1?0=0...+.....7...0...........0!0...+................6N.$i....6.0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}.......0..0V..+.....7....H0F...O.S.......8V.i.s.t.a.X.8.6.,.S.e.r.v.e.r.2.0.0.8.X.8.6.,
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (native) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):34264
                                                                                                                                                                                                                            Entropy (8bit):6.451114076364161
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:nToflu9IisjjMJvOA4hKtbAwut9l/AxkDur/MvBhLwI7PKA+bkxQJ7XakZSZ4dS5:nToBjjOOA4dR/uQvBbuALxQbagPKgzW
                                                                                                                                                                                                                            MD5:EF55CAAABD0E13C304587D941C343F77
                                                                                                                                                                                                                            SHA1:F0E323EF510E00FC925A7FB37C625D077FECA8A3
                                                                                                                                                                                                                            SHA-256:A4E2E4194E15BC93A53FFAB121CCE22CC76EDBC18DFB83132A95F92C9220509F
                                                                                                                                                                                                                            SHA-512:D2C61CCB73C90D26A4D39EBADE87A6F7F23CAA34B29AE14FFA08CA48A32086C6553CA12D38362B6179E82776F3D76F4B05FDD2238B5E7BE4FEEC98A4D8D52573
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C..."..."..."...J..."...J..."...J..."..."..."...J..."...I..."...I."...I..."..Rich."..................PE..L....z.].................N...................P....@.......................................@A....................................P.......X............d...!.......... R..8...........................XR..@............P...............................text....7.......8.................. ..h.rdata..,....P.......<..............@..H.data........`.......B..............@...PAGE....[....p.......D.............. ..`INIT....T............P.............. ..b.rsrc...X............Z..............@..B.reloc...............`..............@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):387400
                                                                                                                                                                                                                            Entropy (8bit):6.458236487570103
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:UTksWxn+v8a7/e3uFm4uy6b1aptMtx1IAOrPdmB4SS4Vw3VTBZiA916NkW:Akska7m3uFm4uy6b10MtxnOrPdmBe3XE
                                                                                                                                                                                                                            MD5:46F33BBA03FF35C0A777B5875E832559
                                                                                                                                                                                                                            SHA1:C4B5487307DB1B715EDA5C233DBD346EF44ABF02
                                                                                                                                                                                                                            SHA-256:72D329B11A240403A74990F7F05CDDA684F53FBFC1E45EE3E565E38000C6FDA1
                                                                                                                                                                                                                            SHA-512:7130F9DEE420D2A377E3CDAE0C47D1F8446E2DA4E021274A15F4FD00583F79C0DBF05819216ABBAAE5493BF1CB1E4FA08EFA673CCDA1BC3A623BAEC828DFC413
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........b...1...1...1..0...1..0{..1..0.1C.0..1C.0.1C.0.1..0...1...1b..1..0...1..p1...1...1...1..0...1Rich...1........PE..L....z.].................<..........`m.......P....@.................................~.....@.....................................x.......................H#.......$......T...........................(...@............P..h............................text....;.......<.................. ..`.rdata..J....P.......@..............@..@.data...l...........................@....rsrc...............................@..@.reloc...$.......&..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):142
                                                                                                                                                                                                                            Entropy (8bit):4.838122400792552
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyPuCkjLoOMXrHt9QVVkUoYmdFwLMiREl32AGN8BvAOA:hiPFvPullYkVVkxYmQLNREVNGN8B6
                                                                                                                                                                                                                            MD5:012961E4DD4402DA78BC174AF09B77F9
                                                                                                                                                                                                                            SHA1:900CA53983FAA217DD134664A9E694138E9A6FDF
                                                                                                                                                                                                                            SHA-256:E7D73C9323599320AFA243DB5313F1A55ADFC34EDE66A4A656CA9172BF3C273D
                                                                                                                                                                                                                            SHA-512:332A6BA6D1923A020DDB36E6E6FA80141B737ECC51EE52EE0D147B85DBC95DD3E97DA20083EAB3F5218DD9F4CA37DA986D35989F251F72C2512A42CBB6B462B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..echo Removing TAP driver.....tapinstall.exe remove tap0901..echo TAP Driver Uninstall completed successfully!..exit..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):346512
                                                                                                                                                                                                                            Entropy (8bit):6.253406880555808
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:sQz5UqJwVKCsnOeuj9PDnBQpUZyNVHhl/FPTCgTx:sQ1UqChsnOeMhBaQy9l/FPW0x
                                                                                                                                                                                                                            MD5:9641732F1DB2EAB135130C9128C1427A
                                                                                                                                                                                                                            SHA1:88B0857CFE055A1D920E55B3094116162E4EAA00
                                                                                                                                                                                                                            SHA-256:B47CD11E4089FE0AE8BAF4E05B4CCF19B1DFE403FD392649E9253C05D58F3CBC
                                                                                                                                                                                                                            SHA-512:5C87B26E51771B61FDF87D577781B1FB163527D0F03E74327BC11EA1A24B1B449D4AB23F7393466ED4BAF3809A5151EB30928F462B5FCD55BB8DE4BD733856A8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]..B........................f......f......f..J.............................a......a......aZ.....a.....Rich...........PE..d...r.wf.........." ...(.p...........v...............................................=....`.........................................p...|.......x....`....... ...1...........p..,...PK.......................M..(....J..@............................................text...`o.......p.................. ..`.rdata...V.......X...t..............@..@.data...T8......."..................@....pdata...1... ...2..................@..@.rsrc........`....... ..............@..@.reloc..,....p......."..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):313744
                                                                                                                                                                                                                            Entropy (8bit):6.2705364965004815
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:7OqwvZdI0CglL0fN5ra4KBb5cSgQkJjMoplVNLQDrkHW:6qwvigF0fN5OB5dgQkBplVNLQDeW
                                                                                                                                                                                                                            MD5:2EEEB7F9DCC44DC28CBFBAF94176CA6F
                                                                                                                                                                                                                            SHA1:65055D6EE4E5A322DB3C74B0EF8CDADECDB32737
                                                                                                                                                                                                                            SHA-256:966DDE59F9ABD125F763A95273BF923C2543A4B9F43F6F0C5587CCA308BD9FFD
                                                                                                                                                                                                                            SHA-512:5919481A1768E9B19CE79ADDDFFC25A6BCDA326232FEB6E61729C2173292F3E2EC7266C646090DCC061A2E9643084583E43947774FDF76842316249B3B2E911F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@D..%...%...%...U...%...U..%...U...%......%......%.....H%...U...%...Y...%...%..}%.......%.......%....v..%.......%..Rich.%..................PE..d...t.wf.........." ...(.................................................................`.........................................0].......]..P................,..............................................(.......@............0..x............................text...,........................... ..`.rdata..h;...0...<..................@..@.data....7...p.......T..............@....pdata...,...........r..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):344464
                                                                                                                                                                                                                            Entropy (8bit):6.268258211828341
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:eyhvW10qILfhXrbR0fkN0addZrKKOYQ9gsYlFtx/pP8fW5:eyhW0qIF10fkNBvgK5QRYlFtxxP8fW5
                                                                                                                                                                                                                            MD5:E6C6C72226677BACF6EC83BEDA63F49D
                                                                                                                                                                                                                            SHA1:C0E75C5A5B9D7C8CD07E80A2BA4D809801EFF649
                                                                                                                                                                                                                            SHA-256:2018F17E324516FC891E5C868E2045970855A3A1521D73F0F6AE12EBF12CFBBA
                                                                                                                                                                                                                            SHA-512:3A52B60711EFB4A34E5FF655E60D51A29C6D4B2CD4561A421A51647D5FCB2C75F1468A8F93C25206EDEBCF259112A4C7DA41F90181FF7E53946E1FFF5FB3F353
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@..!...!...!...Q...!...Q..l!...Q...!.......!.......!......!...Q...!...]...!...!..C!......!......!...~..!......!..Rich.!..........................PE..d...z.wf.........." ...(.l...........e...............................................j....`.........................................0.......8...<....`....... ...2...&.......p.......M.......................O..(....L..@...............x............................text...tj.......l.................. ..`.rdata...Q.......R...p..............@..@.data....=......."..................@....pdata...2... ...4..................@..@.rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):17983376
                                                                                                                                                                                                                            Entropy (8bit):6.549243204630475
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:98304:2M5ISKnKKu/60i9gzTcriqcN9MX4C7GsIAfiz8xS6RWhi62KFfQWmLu2EkKZ3uNx:xO6ggzLI7op6Rt69L2kuNx
                                                                                                                                                                                                                            MD5:E3E8D995E4A1D5E84EE11DBD58D21F3B
                                                                                                                                                                                                                            SHA1:52E7AFB03DD3F45F7B8839879FEC1ACC7965A62E
                                                                                                                                                                                                                            SHA-256:29782AC1F424865FA1007A5F818F35ABB5307B01C099AAA38067513E516A0454
                                                                                                                                                                                                                            SHA-512:F4FB26D4DC2D91D36FD8F26B9BE6B74F50DF94DE530AFDD8D2D5E9D6D6300B52FB9C6EFBD94A95D630094CE59D5D1AA1B898F810BE8806B7E9DFC5466D312659
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............J..J..J..fJ..J...K..J...K..J...Ko.J...K..J...K..J...K..J...K..J..Jh.J..J..Jr..K..Jr..K..JRich..J........................PE..d...]. f.........." ...".d....=......;....................................................`.........................................0[.......b...............p.......L..................T.......................(...`...@....................Y..`....................text... b.......d.................. ..`.rdata....-.......-..h..............@..@.data................v..............@....pdata.......p......................@..@_RDATA..\............2..............@..@.reloc...............4..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):929318
                                                                                                                                                                                                                            Entropy (8bit):7.900306716974538
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:+20deSdhsNk795wZ08KxwK29H7hfnn3MQYa:+20ddsy95WKxwKQnc2
                                                                                                                                                                                                                            MD5:2D1F8BF06610A54B8A61894239012C3B
                                                                                                                                                                                                                            SHA1:98BA3AEC7A32B6BCB264B51364A0A8A664E4FE82
                                                                                                                                                                                                                            SHA-256:8FAFAB1032577F2EDC583C676A9BBFEECF929B5BE22950183C9A77BC2123798B
                                                                                                                                                                                                                            SHA-512:AE9DB2DEA48BFC54274975306FA98921882EA43A590DCF60733B964253C3E9D97BE9CC97F45F18ECCB65802C0EC4599BAFBFF781FE635D6364BD0B657C95655E
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:..]r.U..x..F.q...aI..`vkqqNsSLg..b..F.Iq`..o`y.gm.N._a.lJF.D\FpNm.RRYR.b.to.r.mhG.x.._...F.f.WO.nH..l.ldPH.[m..h..r..YX..mq....i.Q....F....H.m..r...N.JY\k.`T..nLx].oqf..........b.hV.m.TWicY.dpV....IE.d.Tjs.^tS..CUW..F....\......r.yrs.C.I.Xcql..c.....qe.K..T.^..q.i.B.NV_...gk..ACuS..n..]..g.O.yX.....u.J^dPj.g.mHP....E]B..h...HtjI.M\.^.cs.H...q...........p.x^..urE...C`..K..h...`i.M.H...^.Pt..S..p...Y.TP...E.M....\...k.S.m.Hu...Q.....juxX.s.gUG..wrAT[.gc..H...V....j.h.kL...Kgd[bMW...EKa.h..jw....D........F..qFC..Q.HFS.Z.L.....h.B.r...`.xqZ..O.bK.I_kEChAWH`.K..b.kqG.k..cw.i..x...d.yC.....R...^[]]\JD.u\v.HM.....p.a.y]ugLa..Dc.f.MSa[^.sV.Z.hWdD..nRr.V..D.h.Zx.D....O.guI]W.f.].qw.y.UPyO..T.Em.eV..p.^L.j.lPh....jMY.g.Vf.K.YHp[grw.kbx..T.V.]SQm..Eg.\...^q...u.gTh..w..wJ...a.bc..b.....gQo..TtjB.TU....eA..QY....V...uf..B.\oh.w.J.D..R.....x..[_.m..wMD.c.Er.D..E_f...Cm.HX].CKb....E..S...H..Dj.d...kNa.^F...s.teH..w......w......Q.i.d.XD..n..S...u....M.OS.....M...rS.E.G.h.R.\U.N.ASoEw.a.B...O`..DO.Ck.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):63258
                                                                                                                                                                                                                            Entropy (8bit):4.638400083452387
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:PcJillRMp5RLRYkKJdcmFT38Q9aSePEUX5:PcJiDRMD9YdtePz5
                                                                                                                                                                                                                            MD5:127A512367895E269AD9922079C47761
                                                                                                                                                                                                                            SHA1:7444878FEF13B7B4FCBE57D2DB2C527A34CA48C5
                                                                                                                                                                                                                            SHA-256:E841508B1B3D7615F17E691334ECB6B1A7F7A83BC531BFF272E85F048AA3DDFD
                                                                                                                                                                                                                            SHA-512:90E486FA09945BCCBD24542C31F832BEC4AA6EAE7D7A1522526018D0AC38CE855F545E1AB7AEFA1B6F7D78E6F0C8333A607E8A9BF1DCFA74E9E4F3B113AFD15F
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.c.jPxZ...PF...L.f.Ih..t...[.....O...O.o..l...Y.u.....mZ^P...u.v.l...E...W....f.....d.u...M.J.Nyd.i....uH.o.Jid.E..^..x..x.Z..kfmuexCyd.RD._Cm...]G....jwcu.q[.xx..Vj.bsRP.lh...t..j..s...f.ZgNgGc.....Rdk.sHK..q[jD.S.f.i.aZWv..F.O.tp...Zs.n..S..o..be.....d.^Xe..QpnXhy^..eVU..qwe_...[MZ..MTbS.j..n..u..]y.u.t..J.rcm..`e.y...IF..N\..Wt..uOE.dQ..^b..ksh.q..p.U..aLW.EfqS.H.Lm.p.OA..Sa...EY.vUbN.D.V..KqdWL....pE..Enuj.RG.`.R.s....mV.W.i...nc.a.^.m...hg...a...FGX..J...E`....\Z...U...Q....II..xk.]L.mX]........W.F.X.k.f..^M[.....y.Oj.h.eOk_Dj..QRT..SK`.T..G^..n.t..\N..CR.l...G..p..r..V..NoUZVJH.ld..Y.h..jVT.n..S..poIbY.X`.F.mp.BoZ.rW..Wo..b.TI.].RmK.pY..^..F..gRc..q....v..WGn.......C]g...Qh..\Mq..._.....kXB..HV.I]...D.ZIDW[...K.A..H.Pt..O....xJtu......J....^o..J.....WWY..L.VE........b.....[..oA_.n.ac...MKn..W.Q.maX........s..s..c[...Ij....Mu.ux...tPT.\.[..F..gpAH..mA...U..N...mE..y.\..q.C.gG..o..Kms.LL.P\.....cPDD.g.Y.rJZ.aF.iTA....].S.NL.r...l..]...n.`.]`..G^QQuPhO.DL.k.S_y.hD._..sour.i.wfg..`yI
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):99976
                                                                                                                                                                                                                            Entropy (8bit):6.499161413646961
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:yWHL+4KsAzAfadZw+1Hcx8uIYNU5U9H0Q8ecbjt1BHK/CeS:yWr/Z+jPYNV9H0Q8ecbjt1BHK/pS
                                                                                                                                                                                                                            MD5:85054BAF6D0A7D31A18183ACC4CBA133
                                                                                                                                                                                                                            SHA1:24830C002FFAB31102DFB674B52AFFD74E90E708
                                                                                                                                                                                                                            SHA-256:EC86F182F55A338E26F598638F18422E474C6D6C651E1D9955D0303254BF6DDD
                                                                                                                                                                                                                            SHA-512:B6B7D9115ED1D734D7C0EB09E7C7C96EEC29E2C59B8943586976F2182E46B660B99C1947ACF2C1DEB75595771A78B7405FDDBB989A2F06CF88E4AD3D8824055A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d.....`.........." .........`......p................................................>....`A.........................................B..4....J...............p..X....X..............h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):63258
                                                                                                                                                                                                                            Entropy (8bit):4.638400083452387
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:PcJillRMp5RLRYkKJdcmFT38Q9aSePEUX5:PcJiDRMD9YdtePz5
                                                                                                                                                                                                                            MD5:127A512367895E269AD9922079C47761
                                                                                                                                                                                                                            SHA1:7444878FEF13B7B4FCBE57D2DB2C527A34CA48C5
                                                                                                                                                                                                                            SHA-256:E841508B1B3D7615F17E691334ECB6B1A7F7A83BC531BFF272E85F048AA3DDFD
                                                                                                                                                                                                                            SHA-512:90E486FA09945BCCBD24542C31F832BEC4AA6EAE7D7A1522526018D0AC38CE855F545E1AB7AEFA1B6F7D78E6F0C8333A607E8A9BF1DCFA74E9E4F3B113AFD15F
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.c.jPxZ...PF...L.f.Ih..t...[.....O...O.o..l...Y.u.....mZ^P...u.v.l...E...W....f.....d.u...M.J.Nyd.i....uH.o.Jid.E..^..x..x.Z..kfmuexCyd.RD._Cm...]G....jwcu.q[.xx..Vj.bsRP.lh...t..j..s...f.ZgNgGc.....Rdk.sHK..q[jD.S.f.i.aZWv..F.O.tp...Zs.n..S..o..be.....d.^Xe..QpnXhy^..eVU..qwe_...[MZ..MTbS.j..n..u..]y.u.t..J.rcm..`e.y...IF..N\..Wt..uOE.dQ..^b..ksh.q..p.U..aLW.EfqS.H.Lm.p.OA..Sa...EY.vUbN.D.V..KqdWL....pE..Enuj.RG.`.R.s....mV.W.i...nc.a.^.m...hg...a...FGX..J...E`....\Z...U...Q....II..xk.]L.mX]........W.F.X.k.f..^M[.....y.Oj.h.eOk_Dj..QRT..SK`.T..G^..n.t..\N..CR.l...G..p..r..V..NoUZVJH.ld..Y.h..jVT.n..S..poIbY.X`.F.mp.BoZ.rW..Wo..b.TI.].RmK.pY..^..F..gRc..q....v..WGn.......C]g...Qh..\Mq..._.....kXB..HV.I]...D.ZIDW[...K.A..H.Pt..O....xJtu......J....^o..J.....WWY..L.VE........b.....[..oA_.n.ac...MKn..W.Q.maX........s..s..c[...Ij....Mu.ux...tPT.\.[..F..gpAH..mA...U..N...mE..y.\..q.C.gG..o..Kms.LL.P\.....cPDD.g.Y.rJZ.aF.iTA....].S.NL.r...l..]...n.`.]`..G^QQuPhO.DL.k.S_y.hD._..sour.i.wfg..`yI
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):865416
                                                                                                                                                                                                                            Entropy (8bit):6.558002511161394
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:dxRZrLEvOx+pFpQlzLyPkET7c5zaSjLUVaoNkUNBKsEpX:dtUmxmpQFLyPkEixWi
                                                                                                                                                                                                                            MD5:A151697A9F14639BFA2CB3E470CEA355
                                                                                                                                                                                                                            SHA1:FA45D614ABFF2ED9A707E3DFC02F404CFC18A89F
                                                                                                                                                                                                                            SHA-256:4794C710A3E624B1A0D956CFE21EC0433FD85BD2D8EB96ACE3F2B5E5302E225C
                                                                                                                                                                                                                            SHA-512:888CFD3919482BB56A15E23A73C868C277CA925EED122327E3399C23D0D647F07B9CD67CCAE28AFD1048A41710DA50126B38E75D7455F56AA95BBECA42D228BF
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........*.w.K.$.K.$.K.$.3.$.K.$.>.%.K.$.$l$.K.$.>.%.K.$.>.%.K.$.>.%.K.$w>.%.K.$w>.%.K.$. .%.K.$. .%.K.$.K.$.I.$w>.%.K.$w>.%.K.$w>n$.K.$w>.%.K.$Rich.K.$................PE..d.....b.........."...........................@....................................q.....`.........................................Pd..P....d..........8....P...^..................................................`...8............................................text.............................. ..`.rdata..^...........................@..@.data...............................@....pdata...^...P...`..................@..@.rsrc...8...........................@..@.reloc..............................@..B................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):323472
                                                                                                                                                                                                                            Entropy (8bit):6.24323878406639
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:aK/qrBUA8kikYQQ2sXvNnot1bdNtb1lHSdrkjoE:a8qC5kikpQX1ny1bdv1lHSdYjoE
                                                                                                                                                                                                                            MD5:BFEC2012B6589D4496EA0283E90A5269
                                                                                                                                                                                                                            SHA1:813E3FAD5CFE4A30E20F05080D106811C5544FA3
                                                                                                                                                                                                                            SHA-256:F9406ECAA9C86F2946F8B9D997F0210F1F5EE974BE6548D1DB039014D1B45552
                                                                                                                                                                                                                            SHA-512:396F28EB15ED793DB453CD3B3E9118F4386FE24A75E3F3914E881CCA3ADA8918B98751BDAC51C4A5E897CCA1E700B2A545686463A6B0DD6719EA172682CFB928
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`&..$Gt.$Gt.$Gt..7w.!Gt..7q.Gt..7p.4Gt...w..Gt...p.*Gt...q.iGt..7u."Gt..;u.'Gt.$Gu.\Gt.7.q.#Gt.7.t.%Gt.7..%Gt.7.v.%Gt.Rich$Gt.........PE..d...^.wf.........." ...(.*................................................... .......7....`.........................................@x..|....x..d...............P...............................................(.......@............@..x............................text...@).......*.................. ..`.rdata...F...@...H..................@..@.data....6....... ...v..............@....pdata..P........0..................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):256912
                                                                                                                                                                                                                            Entropy (8bit):6.232383775712062
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:WEq38uejOBA0ItZ1PNWPQqLlXXXXVXDBsXdZC/R0EjW0VnXNvdroJ:/q0jOBARWPRLlXXXXVXSXdZk0EjW0VnM
                                                                                                                                                                                                                            MD5:850A43E323656B86AE665D8B4FD71369
                                                                                                                                                                                                                            SHA1:099D6E80C394CCC5233E1CBD6B29769DA9E0E2AA
                                                                                                                                                                                                                            SHA-256:539423D2E436E198DF15B5577D816DC306BA4C03B1362F7731E675B51F4A5F42
                                                                                                                                                                                                                            SHA-512:1F2778040E906EA2939A8B0A682E267599AA8422F81EA83BB6C980A304B569AD750EF3E81E1490EDD5B1D74E734A2CB82F428F47096C55436037E03E516D2378
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......w...3...3...3......6..........u..9....u..#....u..`......"......;......1... r..$...3...... r..:... r&.2...3.N.2... r..2...Rich3...........PE..d.....wf.........."....(.Z.....................@.............................0......#.....`.................................................Tq..T....... ........%........... .......#.......................%..(...`"..@............p.. ............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data....0...........v..............@....pdata...%.......&..................@..@.rsrc... ...........................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):94856
                                                                                                                                                                                                                            Entropy (8bit):5.499392443352034
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:RmYSYxGfIZnRnD6M7EFOUakPhtUn6KXF4O7Wm1xK/CpcW:QYFZnRDGdvPXU6K1RWmPK/4h
                                                                                                                                                                                                                            MD5:834EE5DA601A6C78C43C64F6C282682F
                                                                                                                                                                                                                            SHA1:03920B402B787CA53CD79A66B0B611C899B91F3E
                                                                                                                                                                                                                            SHA-256:754B61DA108CC9379585E18DDCE90A8092C1B17DA5D922A6E8D6CE84A90B0F87
                                                                                                                                                                                                                            SHA-512:C4A6A49D1EE316FB9EA399487EA17DD813C0A611F473F4FD054D07F6D5C6BB786D40FA478254A499DB3E1D5F0AFDA3B72651EF097945D0C3AA9F0D83D9C0ED06
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........V........-.....;......<.......+....%......S....%......2....~......,.....)...Rich..........PE..d...<..W..........".................Tv..............................................I.....@.......... ..................................................h.......l....D.......p..........................................................X............................text............................... ..`.data...............................@....pdata..l...........................@..@.rsrc...h...........................@..@.reloc..z....p.......B..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):178552
                                                                                                                                                                                                                            Entropy (8bit):6.1636094237053305
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:2h5CDZ37FRuI7hDEjQ777RZ7B7T7N55Fjh/YAWFOEBhzFJEB55jKTrK/T:J3bRn9ZNnB5NfKTW/T
                                                                                                                                                                                                                            MD5:3D0E093C2EA9BE7460BFBAD86E6FBB58
                                                                                                                                                                                                                            SHA1:C36EB5601DF523DE321146CF1853F899921AB519
                                                                                                                                                                                                                            SHA-256:810DD30ED0002E2D71937EA818F77E60B0D385D32CC61D92A466FCB6FDCE5526
                                                                                                                                                                                                                            SHA-512:CF4A35C0FAA30FE2B96F2A04E91AFCF9CD08ADF021031C1CEFEF8E2F4028381FD1DEABA7B744AB2245B60A623715CDE8B7C8C9D7AE52728701D773F4B26367BB
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........-......#.....L...................`.....l......................................@... .........................H.......................................t...................................................................................text....K.......L..................`.p`.data........`.......P..............@.0..rdata..,....p.......R..............@.`@.bss..................................`..edata..H............f..............@.0@.idata...............v..............@.0..CRT....,............|..............@.0..tls.... ............~..............@.0..reloc..t...........................@.0B........................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):93832
                                                                                                                                                                                                                            Entropy (8bit):5.485112927422894
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:fP2K0pa0WfEYp9Y/XQhpgnbP212YCJpDhiF4O7WGkK/CH8:fePOYe4bu1epDh8RWGkK/b
                                                                                                                                                                                                                            MD5:8E7EE7C3876683902475753519681407
                                                                                                                                                                                                                            SHA1:75FACB7F9C59B284F97956E799E57FB0F606C49D
                                                                                                                                                                                                                            SHA-256:6D5041A8EF796C66BA151D8FCFAFDD96BCAA99B57D2777897FD25A87A5E41E13
                                                                                                                                                                                                                            SHA-512:523EBF3A4DF9F6D299E72079DEF0A0DA9127601796D9AA613B70AD2F66EE2166F4F8F75083F47E67FFFD892A09FA437F3B12BD1B27065200E90F8617E3E83727
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X...9...9...9...AF..9...AW..9...A@..9...9..f9...AP.9...AY..9.......9...AG..9...AB..9..Rich.9..........................PE..d.....pK.........."......~...........s.......................................p............@.......... ......................................X}..........p.......T....@.......`......0................................................................................text....|.......~.................. ..`.data...x...........................@....pdata..T...........................@..@.rsrc...p...........................@..@.reloc..p....`.......>..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):918536
                                                                                                                                                                                                                            Entropy (8bit):6.038516348303836
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:Kts+IUZyyi1sznLRjH0qawdB1iT7jwq7Kjn+o/J:KtLIUZPyaVH0qawP1iDwjn+oh
                                                                                                                                                                                                                            MD5:6F1B7C24C5FF662F4364B323F42C101A
                                                                                                                                                                                                                            SHA1:B74949B7A809F8139BD89BD5B96E230108A6615D
                                                                                                                                                                                                                            SHA-256:034248CEFD5BC35A927682E44B79C354A0AEE25E800CF99D86EC591FD8722B5A
                                                                                                                                                                                                                            SHA-512:B13B4A46FB14C687925DE21982C4DE66C201E9FE16D7C03B2C65900CEF47C5E6DB338545E868EE6216C2A92453557BEA6C0D084B5D76A731CAA00BA821FA40E0
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.Y...../...................H................@.................................n.....@... .........................N.......(................................a...................................................#..`............................text...............................`.P`.data....%.......&..................@.`..rdata..D...........................@.`@.bss.....G............................`..edata..N...........................@.0@.idata..(...........................@.0..CRT....4...........................@.0..tls.... ............0..............@.0..reloc...a.......b...2..............@.0B/4...........P......................@..B/19..........`......................@..B/31.....]............8..............@..B/45.......... .......T..............@..B/57..........@.......p..............@.0B/70..........P.......x..............@..B/81..........`.......~..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):346512
                                                                                                                                                                                                                            Entropy (8bit):6.253406880555808
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:sQz5UqJwVKCsnOeuj9PDnBQpUZyNVHhl/FPTCgTx:sQ1UqChsnOeMhBaQy9l/FPW0x
                                                                                                                                                                                                                            MD5:9641732F1DB2EAB135130C9128C1427A
                                                                                                                                                                                                                            SHA1:88B0857CFE055A1D920E55B3094116162E4EAA00
                                                                                                                                                                                                                            SHA-256:B47CD11E4089FE0AE8BAF4E05B4CCF19B1DFE403FD392649E9253C05D58F3CBC
                                                                                                                                                                                                                            SHA-512:5C87B26E51771B61FDF87D577781B1FB163527D0F03E74327BC11EA1A24B1B449D4AB23F7393466ED4BAF3809A5151EB30928F462B5FCD55BB8DE4BD733856A8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]..B........................f......f......f..J.............................a......a......aZ.....a.....Rich...........PE..d...r.wf.........." ...(.p...........v...............................................=....`.........................................p...|.......x....`....... ...1...........p..,...PK.......................M..(....J..@............................................text...`o.......p.................. ..`.rdata...V.......X...t..............@..@.data...T8......."..................@....pdata...1... ...2..................@..@.rsrc........`....... ..............@..@.reloc..,....p......."..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):244360
                                                                                                                                                                                                                            Entropy (8bit):6.534833630270433
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:lE2PcqwWvsYJlWewlEyDFINgMjY/fVYPCtmA+KiA/R:lE+1JYVEgFugMjXP/A0A/R
                                                                                                                                                                                                                            MD5:92CAE75041DFA888EE8284E7C6BB658E
                                                                                                                                                                                                                            SHA1:2632FD77EAEDC09977192CFAA19EAEE66F538041
                                                                                                                                                                                                                            SHA-256:ACEB2DBBA3948EF0D2908CAE3B2E1586AC82B700C1DE7E6420FA241EFBBB0ECB
                                                                                                                                                                                                                            SHA-512:F01AC04FBD3EA1FD4D39D7654DF7D97EB15D60BC9EDFDF36C92176CF8A66FC148E4ECA480F52B7283AF1B9966983F4275A4E221E2D73056A7F3F4290C4D85C17
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R."K...........#...8............`..............k................................Ub........ ......................P.. ....p...$...................................................................................................................text...t...........................`.P`.data...0%.......&..................@.`..rdata..x^.......`..................@.`@.bss.........@........................@..edata.. ....P.......*..............@.0@.idata...$...p...&...H..............@.0..reloc...............n..............@.0B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3490952
                                                                                                                                                                                                                            Entropy (8bit):6.105770368598401
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:+VwASO4GIU6injGtlqBGqgOtUyrQ8SFJnofeT5W7aTNP6nZsi61o1CPwDv3uFfJe:xB+btBQQ7UQnZsY1CPwDv3uFfJe
                                                                                                                                                                                                                            MD5:474D774A60BCBDBB326C248D1B86C785
                                                                                                                                                                                                                            SHA1:C8611E2BEA720BB3B8768BB7F347DE04EAB8B00D
                                                                                                                                                                                                                            SHA-256:4FB11C716E57A352D0C40B83F00B73A23B16F4418247AFB0E8CA114C20ED7414
                                                                                                                                                                                                                            SHA-512:D25EFAE915E303AB98F86A3131E5C128BFFB0FEE7317C2F28D7A9C9836186C46FDB64008BE98EBF1B7C97F809AD4A170929583B5B899427C405C90503D3D39E0
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.Q.5.?.5.?.5.?.<..'.?.g.>.7.?.g.:.>.?.g.;.=.?.g.<.1.?.!.>.8.?.5.>.?.5.?.+.?...;.N.?...?.4.?.....4.?...=.4.?.Rich5.?.........................PE..d...g..b.........." .....p%...................................................5.......5...`...........................................0..h....4.T.....5.|.....3.......5...... 5..P..T.-.8.............................-.8.............4..............................text....o%......p%................. ..`.rdata........%......t%.............@..@.data....~....2..0...t2.............@....pdata........3.......2.............@..@.idata..T'....4..(...h4.............@..@.00cfg..Q.....5.......4.............@..@.rsrc...|.....5.......4.............@..@.reloc...z... 5..|....4.............@..B................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):543632
                                                                                                                                                                                                                            Entropy (8bit):6.3781262731970685
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:zqzF5VH24Jy+0PeZOYbxobw+QY0heC9lVNLETyoK:zqh32SRoc+QY0n9lVNLETbK
                                                                                                                                                                                                                            MD5:94267176E212B8EBFF06728CC6C3F432
                                                                                                                                                                                                                            SHA1:F65313083C2B3177F405B7AB884BA0A9BE3251D9
                                                                                                                                                                                                                            SHA-256:08D08CBFA4D5531CEEE16BFCB2255EDA79C5B7F7C0894C4E6F49F673457AB362
                                                                                                                                                                                                                            SHA-512:014459C9D3DBE7C09E0D6DB085CE9F715248BA6D784845339B2D6896A8BA7B680C93E707D4990350E30C8853A95FD0DC6F8E9244643787DB65AB8A2F95C26967
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W..6..6..6..XF..6..XF...6..XF..6......6......6.......6..XF..6..}J..6..6...6.....6.....6...O.6.....6..Rich.6..........PE..d...~.wf.........." ...(.....4......L.....................................................`.........................................p...........d....p....... ...B...0..........................................(...p...@............0...............................text............................... ..`.rdata.......0......................@..@.data....J.......2..................@....pdata...B... ...D..................@..@.rsrc........p......................@..@.reloc............... ..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):113800
                                                                                                                                                                                                                            Entropy (8bit):6.497871168162335
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:NADrSog8rBPCmGxRmZZlfzaag8fPrZyEOE9toSK/G:qDl9PQTmZ53rZyEOE92L/G
                                                                                                                                                                                                                            MD5:C966B6A5F0143199FF16F8E491E2B44D
                                                                                                                                                                                                                            SHA1:A47ECE66964E5432551E782EC53EBFEA42845256
                                                                                                                                                                                                                            SHA-256:EA7E53C74D1E66FB0363A16DCCB2B893183937BF4A69770EA44D6BCD6C1A15D6
                                                                                                                                                                                                                            SHA-512:54292A35794B0E147BDCDE724D7101FEDD499F5799175545C5E2BB4362D6387B713EBF511EBF25B4D7E41086073E167524C401936623BB3AE8E337E3D5ADE5CF
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........hw...........q......|......|......|......|.....P|.....b............P|.....P|.....P|.....P|.....Rich............PE..d......b.........." ................................................................."....`..........................................p.......}.......................................Y...............................Z..8............................................text............................... ..`.rdata..z...........................@..@.data...(............t..............@....pdata...............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):17983376
                                                                                                                                                                                                                            Entropy (8bit):6.549243204630475
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:98304:2M5ISKnKKu/60i9gzTcriqcN9MX4C7GsIAfiz8xS6RWhi62KFfQWmLu2EkKZ3uNx:xO6ggzLI7op6Rt69L2kuNx
                                                                                                                                                                                                                            MD5:E3E8D995E4A1D5E84EE11DBD58D21F3B
                                                                                                                                                                                                                            SHA1:52E7AFB03DD3F45F7B8839879FEC1ACC7965A62E
                                                                                                                                                                                                                            SHA-256:29782AC1F424865FA1007A5F818F35ABB5307B01C099AAA38067513E516A0454
                                                                                                                                                                                                                            SHA-512:F4FB26D4DC2D91D36FD8F26B9BE6B74F50DF94DE530AFDD8D2D5E9D6D6300B52FB9C6EFBD94A95D630094CE59D5D1AA1B898F810BE8806B7E9DFC5466D312659
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............J..J..J..fJ..J...K..J...K..J...Ko.J...K..J...K..J...K..J...K..J..Jh.J..J..Jr..K..Jr..K..JRich..J........................PE..d...]. f.........." ...".d....=......;....................................................`.........................................0[.......b...............p.......L..................T.......................(...`...@....................Y..`....................text... b.......d.................. ..`.rdata....-.......-..h..............@..@.data................v..............@....pdata.......p......................@..@_RDATA..\............2..............@..@.reloc...............4..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):776328
                                                                                                                                                                                                                            Entropy (8bit):6.92032788063544
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:uQmCy3NeRjkpQmj3oaMtQqjoygfXq3kon9IlbgaOxQdVJJ6j5EBKX8hUk/K:vmCy3VQs9MtLjTgfa3kon9FaOdEukC
                                                                                                                                                                                                                            MD5:6ECA26F16FEB505B1BD0A0A25DA4AEDB
                                                                                                                                                                                                                            SHA1:297A6E0D660FAF9E924B2BE827D9D9DC81E4EB85
                                                                                                                                                                                                                            SHA-256:CD9005B83CAB43E566F287D1BB1A3DE33F2D67AD5013DC5213232A5DC5309BDB
                                                                                                                                                                                                                            SHA-512:78F749E1D591D9AC2C1BB3A47FA7D4099A18303357F990E97D6E531FA50FE2466C8A203504F599C74EE92DFA179CC4AFBC561C60AFD01FA103A3276E79760A46
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ R.HA<.HA<.HA<.A9..KA<.HA=..A<.'7..@<.'7...A<.'7..|A<.'7...A<.'7..IA<.'7..IA<.'7..IA<.RichHA<.........PE..L.....K.........."!................. ....... .....x................................m.....@..........................I......D...(............................... L..h...8...........................pE..@............................................text............................... ..`.data...|Z... ...N..................@....rsrc................X..............@..@.reloc.. L.......N...\..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):2276496
                                                                                                                                                                                                                            Entropy (8bit):6.2839627604807955
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:sqrGLY4rzqgpJdli4OLz1/SK1ULLnLWdaqTv6akDCbpCX464lnbW148y1PuDT5Wg:sqr0Y4rugpJdli4OLz1/SK1ULLLWdaq8
                                                                                                                                                                                                                            MD5:A928351F9555A07B7A8DCEA6B209D367
                                                                                                                                                                                                                            SHA1:66379948FB082D9EB390B77C4E00EFAD25062C9C
                                                                                                                                                                                                                            SHA-256:8993C69DAA63314019E3D33190140ACAC23704D20AB3BDF946B41969DD23B0A7
                                                                                                                                                                                                                            SHA-512:099DAD1E89474F449EF9EA35CC93C2C8A643AF9108FD38FFB7B748FE93F0A25553B135AC6C6E33EDB8B1AD55687CDF182C6FA3E2D5018110D0500C3E2CA35EEA
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.Y.p...<.....!.............0................(c.........................@........"...@... .........................A....P..........@.............".....................................p.......................R..h............................text...............................`.p`.data...|d.......f..................@.`..rdata..T............d..............@.`@.bss.........`........................`..edata..A............B..............@.0@.idata.......P......................@.0..CRT....,....`......................@.0..tls.... ....p......................@.0..rsrc...@...........................@.0..reloc.............................@.0B/4...........@......................@..B/19......i...P...j..................@..B/31..................,..............@..B/45..................@..............@..B/57..................R..............@.0B/70.....2............Z..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):397712
                                                                                                                                                                                                                            Entropy (8bit):6.40156340476818
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:ThaEhq4cY0f8IlE6BZR2nUx9lYOUgLZUrd:T4EhqR5lE6xSUx9lYOUg6rd
                                                                                                                                                                                                                            MD5:42C063882FD7CEDD3CC62356450D8987
                                                                                                                                                                                                                            SHA1:A09DB77F70A6F7D7C59418FC08250A8E13E8A60D
                                                                                                                                                                                                                            SHA-256:37D1EBFC8F423BF02DEC598C6421E4124C8C5666C27782180D84003039E88DFF
                                                                                                                                                                                                                            SHA-512:77AC9C670F91059B2CAA12DA9B5417CD71D525F900B7DDA51FFCF499AA2882734B342F6803814C6FDE1B527C9742ED9CF67AB1EE8D141CB437B57C979D89B456
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q{.?...l...l...l.j.m...l.j.m...l.j.m...l..m...l..m...l..mY..l.j.m...l.f.m...l...m...l...l...l...m...l...m...l..zl...l...l...l...m...lRich...l........PE..d...j.wf.........." ...(.....L......l........................................0......E.....`..........................................*......x+..........h[.......3........... ..`...............................(...p...@............................................text...|........................... ..`.rdata...o.......p..................@..@.data....?...@...(...2..............@....pdata...3.......4...Z..............@..@.rsrc...h[.......\..................@..@.reloc..`.... ......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):929318
                                                                                                                                                                                                                            Entropy (8bit):7.900306716974538
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:+20deSdhsNk795wZ08KxwK29H7hfnn3MQYa:+20ddsy95WKxwKQnc2
                                                                                                                                                                                                                            MD5:2D1F8BF06610A54B8A61894239012C3B
                                                                                                                                                                                                                            SHA1:98BA3AEC7A32B6BCB264B51364A0A8A664E4FE82
                                                                                                                                                                                                                            SHA-256:8FAFAB1032577F2EDC583C676A9BBFEECF929B5BE22950183C9A77BC2123798B
                                                                                                                                                                                                                            SHA-512:AE9DB2DEA48BFC54274975306FA98921882EA43A590DCF60733B964253C3E9D97BE9CC97F45F18ECCB65802C0EC4599BAFBFF781FE635D6364BD0B657C95655E
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:..]r.U..x..F.q...aI..`vkqqNsSLg..b..F.Iq`..o`y.gm.N._a.lJF.D\FpNm.RRYR.b.to.r.mhG.x.._...F.f.WO.nH..l.ldPH.[m..h..r..YX..mq....i.Q....F....H.m..r...N.JY\k.`T..nLx].oqf..........b.hV.m.TWicY.dpV....IE.d.Tjs.^tS..CUW..F....\......r.yrs.C.I.Xcql..c.....qe.K..T.^..q.i.B.NV_...gk..ACuS..n..]..g.O.yX.....u.J^dPj.g.mHP....E]B..h...HtjI.M\.^.cs.H...q...........p.x^..urE...C`..K..h...`i.M.H...^.Pt..S..p...Y.TP...E.M....\...k.S.m.Hu...Q.....juxX.s.gUG..wrAT[.gc..H...V....j.h.kL...Kgd[bMW...EKa.h..jw....D........F..qFC..Q.HFS.Z.L.....h.B.r...`.xqZ..O.bK.I_kEChAWH`.K..b.kqG.k..cw.i..x...d.yC.....R...^[]]\JD.u\v.HM.....p.a.y]ugLa..Dc.f.MSa[^.sV.Z.hWdD..nRr.V..D.h.Zx.D....O.guI]W.f.].qw.y.UPyO..T.Em.eV..p.^L.j.lPh....jMY.g.Vf.K.YHp[grw.kbx..T.V.]SQm..Eg.\...^q...u.gTh..w..wJ...a.bc..b.....gQo..TtjB.TU....eA..QY....V...uf..B.\oh.w.J.D..R.....x..[_.m..wMD.c.Er.D..E_f...Cm.HX].CKb....E..S...H..Dj.d...kNa.^F...s.teH..w......w......Q.i.d.XD..n..S...u....M.OS.....M...rS.E.G.h.R.\U.N.ASoEw.a.B...O`..DO.Ck.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):321936
                                                                                                                                                                                                                            Entropy (8bit):6.249416182192696
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:49C2dRHqGR0N9BdVLATWWFQEDyhNSDEAIjUoMfqC9ulMdUBIKL:Z2dRHqGRyhAT9FxoSIAIx/C9ulMe2KL
                                                                                                                                                                                                                            MD5:5C1752EF16C7E3B28D9662E3C08FB08F
                                                                                                                                                                                                                            SHA1:4B3F3BE508D4C6CD8374FBB812EE30E99F8128C0
                                                                                                                                                                                                                            SHA-256:1BF45DF354D53D400EAF644E205DADDB0C07B408EB0C03D8CCFF765BD6659FB3
                                                                                                                                                                                                                            SHA-512:296F8AA642527C3A2364B9FA0E1C9F3EE3B7AD6F82D51685F71601F4E4A0E5DA5327FF1E1884F6264E7961417D54028B4E9BBE1B836968FF0F9D6685EBEE0327
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 62%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Z.H.;...;...;..6K...;..6K..q;.......;.......;.......;..6K...;..6K...;...G...;...;...;.......;.......;....p..;.......;..Rich.;..........................PE..d...O.wf.........." ...(.*...........0....................................... ......h1....`..........................................t..t...Du..x................-..............................................(.......@............@...............................text...,(.......*.................. ..`.rdata..rC...@...D..................@..@.data...x7....... ...r..............@....pdata...-..........................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):585512
                                                                                                                                                                                                                            Entropy (8bit):6.002108518534667
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:kavF2w273DAx5at3y6/c1M94lh7NX06qkX/0IT7/5:kAF2w2jE5k3y6/cyinNXy4B7h
                                                                                                                                                                                                                            MD5:2C700BBCDA59BFE2CD7EBF9BAA5B2626
                                                                                                                                                                                                                            SHA1:72EFAA0E8652FB4ADC21E4484E7F63AA968F39D2
                                                                                                                                                                                                                            SHA-256:C9C59AB5B3369B97C85129F160491BD743B68DE1AD41EE6EEBA69009407B54E7
                                                                                                                                                                                                                            SHA-512:0911C7FED9653D9D50BAD7219E45778367DE4B105B5079A8011415F65465B80782A98A503CEBFB309997BCFB2A8620402579456565A24C69A20CBCBD0130DA20
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.Y...........!..............................`n.........................p......L.....@... .........................m).......3...0..@....................@...)........................... .......................................................text...T...........................`.P`.data....-..........................@.`..rdata..............................@.`@.bss....d.............................`..edata..m).......*...t..............@.0@.idata...3.......4..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...@....0......................@.0..reloc...)...@...*..................@.0B/4...........p......................@..B/19......l.......n..................@..B/31...../............v..............@..B/45.....|...........................@..B/57..........0......................@.0B/70.....2....@..........
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):42120
                                                                                                                                                                                                                            Entropy (8bit):6.157445136592099
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:tFRn6+bvfApVjLj1mFU6rrFqyO9K/Yfryu:tFFepV3j1mm6/pO9K/COu
                                                                                                                                                                                                                            MD5:F6AFD5499FCC5D464085AD889BAE09B7
                                                                                                                                                                                                                            SHA1:287C540655FCED0C09DDA2D9C4EADD3F3E210B17
                                                                                                                                                                                                                            SHA-256:6EDA54D746C092A45395399319DFC878E5674C84FAB8147821524A0042C03F47
                                                                                                                                                                                                                            SHA-512:BFD5ED90D0F16A2F0BCC22B0E847D5781A7B11D6912A51CDC8FCAAD80BF191D821418F7544BF52BF6E1AAA47D06A5442601543E9C25B2352D4E23AFC0C4668F9
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......kT../5../5../5..&M<.#5..}@..-5..}@..=5..}@..%5..}@..,5..;^..$5../5..p5...@..,5...@P..5...@...5..Rich/5..........PE..d.....b.........."......0...H.......4.........@....................................e.....`.................................................4g..........@............v..........8...P]...............................]..8............@...............................text..../.......0.................. ..`.rdata...3...@...4...4..............@..@.data...H............h..............@....pdata...............j..............@..@.rsrc...@............n..............@..@.reloc..8............t..............@..B................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):700040
                                                                                                                                                                                                                            Entropy (8bit):5.552155208041958
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:UB4x/cH7gueaxFi00ZoPqETRzRnYhUpfakLaugPoDhTMY98c8mvVfU2lvzpi/O:avziRZoXuugCtD8JmvNU2lvzpiG
                                                                                                                                                                                                                            MD5:6EE5C92E2918B27974086A6F24D79043
                                                                                                                                                                                                                            SHA1:40595B75A513BBF1BE16780784E13EFDAD2E40C7
                                                                                                                                                                                                                            SHA-256:86F3A19221C710CFF12607FEB00D8CD0AF932873430AD1B59C990593010EC3CF
                                                                                                                                                                                                                            SHA-512:F07BBE5D367D6F7474E08507F3827BDCAC5503673F2027CA139303FA573F4EEB7D82A9D88EE0F3291F53629C0644B39E2C81380B45F8E2A286FFCC326AE0E4B7
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............]...]...]..M]...]..\...]...\...]..\...]..\...]..\...]H..\...]...]o..]H..\...]H..\...]H.!]...]H..\...]Rich...]........PE..d...g..b.........." .....:...L......<.....................................................`..........................................+...N..@E..........s........L..............h.......8...........................@...8............0..@............................text....8.......:.................. ..`.rdata...)...P...*...>..............@..@.data...QM.......D...h..............@....pdata...T.......V..................@..@.idata..*W...0...X..................@..@.00cfg..Q............Z..............@..@.rsrc...s............\..............@..@.reloc..]............d..............@..B................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):344464
                                                                                                                                                                                                                            Entropy (8bit):6.268258211828341
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:eyhvW10qILfhXrbR0fkN0addZrKKOYQ9gsYlFtx/pP8fW5:eyhW0qIF10fkNBvgK5QRYlFtxxP8fW5
                                                                                                                                                                                                                            MD5:E6C6C72226677BACF6EC83BEDA63F49D
                                                                                                                                                                                                                            SHA1:C0E75C5A5B9D7C8CD07E80A2BA4D809801EFF649
                                                                                                                                                                                                                            SHA-256:2018F17E324516FC891E5C868E2045970855A3A1521D73F0F6AE12EBF12CFBBA
                                                                                                                                                                                                                            SHA-512:3A52B60711EFB4A34E5FF655E60D51A29C6D4B2CD4561A421A51647D5FCB2C75F1468A8F93C25206EDEBCF259112A4C7DA41F90181FF7E53946E1FFF5FB3F353
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@..!...!...!...Q...!...Q..l!...Q...!.......!.......!......!...Q...!...]...!...!..C!......!......!...~..!......!..Rich.!..........................PE..d...z.wf.........." ...(.l...........e...............................................j....`.........................................0.......8...<....`....... ...2...&.......p.......M.......................O..(....L..@...............x............................text...tj.......l.................. ..`.rdata...Q.......R...p..............@..@.data....=......."..................@....pdata...2... ...4..................@..@.rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):27784
                                                                                                                                                                                                                            Entropy (8bit):6.488306745612165
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:YVfdXePAee0fxvSDv2atBymU+DpbGEgivBpnpwK3CrFqa2S0FP27NBYearrDVY:afdXfOvObbU+Nb5RgrFq7rK/YfrDS
                                                                                                                                                                                                                            MD5:41C55E2A9D5D9B23C08E3DC067780DC7
                                                                                                                                                                                                                            SHA1:1FB62C7FCF24F604676896121C1CCAFB628C1BE1
                                                                                                                                                                                                                            SHA-256:D76995DCE5A5A3B0D77ABB438C14504F9825A6BC98676F1BA8D0CC18CEBB0545
                                                                                                                                                                                                                            SHA-512:396E8878BAFCFC0DF994B9AF23176D343230B6F6EE82A71E14EFA56347EF0C63B4D277C029EF9FB3EF69D6F1B8AE73ECF92D8DCEDC9312E0C8BFA86EC0B611D2
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7X.................6...........T... ...`....@.. ....................................@..................................T..K....`...............>............................................................... ............... ..H............text....4... ...6.................. ..`.rsrc........`.......8..............@..@.reloc...............<..............@..B.................T......H........1..."..........|0..p...........................................6.(.....(....*...0..S............(....o.....s.......o....s.......o......o.........&..o............9.....o.....*.......#..6........../E.......0..E............(....o.....s.......o....s.......o.........&........9.....o.....*.........#../..........!7.......0..M.......~....s......o.....;.....o......#......$@(....o.........&........9.....o.....*...........,7..........4?.......0..M.......~....s......o.....;.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):277
                                                                                                                                                                                                                            Entropy (8bit):5.0491979415178765
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:ShdEdI5KGdXrSwCoXV+hn5A59eT5U+hLQsPti5FtEEs6EsctB6WEsF2WEsF+v:6dEKwGxOsw7BB6S2zv
                                                                                                                                                                                                                            MD5:C8768E552ABCA40175C704E4AF1F030C
                                                                                                                                                                                                                            SHA1:7B8A3BC3310EE72006FD2C5A4D5F4FC60171C81B
                                                                                                                                                                                                                            SHA-256:50259EEA13E0A9CB0AC48181F8F4345E6558EE8536CC71D0F6E2F63AE9D89D33
                                                                                                                                                                                                                            SHA-512:09FD06DB34894F1EC79B607217DC70E204793E04C58B846DC495DC915F38C1311AC1EE0D3C5CCDE636D8A3D6CE5631EF7291D3617FB3F900FD072CEA5831B573
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:OpenVPN STATISTICS..Updated,2023-09-03 07:45:36..TUN/TAP read bytes,1979..TUN/TAP write bytes,9103..TCP/UDP read bytes,15521..TCP/UDP write bytes,5150..Auth read bytes,9103..pre-compress bytes,0..post-compress bytes,0..pre-decompress bytes,204..post-decompress bytes,213..END..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):545680
                                                                                                                                                                                                                            Entropy (8bit):6.371479071684404
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:8xqABhfuM6KsuJPR9K+EvLHhDcsgsEO5CllKDh/eF4:8xqDM9+lHNcsgACllKDh/eF4
                                                                                                                                                                                                                            MD5:2D885495E81A8B8D1D5305FE20566484
                                                                                                                                                                                                                            SHA1:F1D2083D399DD48927CBD83E23F90AD3CE3E0632
                                                                                                                                                                                                                            SHA-256:EB2E18881DDD80A3E54527264B3E7C5046F15854A196B76CCAD28E8258F3F1B2
                                                                                                                                                                                                                            SHA-512:E2BB9F8E377B381CC13538B39E8B3FB749341FCEF84E7B26749BF35141C6C52A48636BB00C6FA7C585EEC4C01B03CD0EC38C8F3E85E0CA2C2CDA26D026DEF326
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Do!O..O...O...O..~L...O..~J...O..~K...O..L...O..K...O..J.K.O..~N...O..rN...O...N.y.O...J...O...O...O.......O...M...O.Rich..O.........................PE..d...|.wf.........." ...(.&...&......................................................$D....`.............................................|.......P....p....... ..TB...8..........P...p........................ ..(...0...@............@...............................text...P$.......&.................. ..`.rdata.......@.......*..............@..@.data...tA.......*..................@....pdata..TB... ...D..................@..@.rsrc........p.......&..............@..@.reloc..P............(..............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):539536
                                                                                                                                                                                                                            Entropy (8bit):6.374120901700144
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:F2qV/eGvVJVbhqs7MRkPXpaCLz9gS+f/9VNtP8zC:F2q9rVJeMp1Lz9gj/9VNtP8zC
                                                                                                                                                                                                                            MD5:7024D49DF9315B5718F40FCD29A8656F
                                                                                                                                                                                                                            SHA1:EF243D1EC09F2FB714459D596F40A87B5B51C054
                                                                                                                                                                                                                            SHA-256:51877E41297AE94FE33D01D980717AE18938A3E81A32C57ADC77D754EF7E66BE
                                                                                                                                                                                                                            SHA-512:D9B7661B923B45020641F80A4695079A86F92848A022C8374C9339258A3F63D628000628CF75163B7C707A8506BB4D4928A1EA75E09FA6416EB9A2150EB5B705
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k....m...m...m..zn...m..zh._.m..zi...m.?.n...m.?.i...m.?.h...m..zl...m.=vl...m...l.}.m..h...m..m...m.....m..o...m.Rich..m.........................PE..d...`.wf.........." ...(.....&......<........................................p.......N....`.........................................P...p.......P....P..........<B... .......`..\...P...........................(.......@............ ...............................text............................... ..`.rdata..,.... ......................@..@.data....B.......*..................@....pdata..<B.......D..................@..@.rsrc........P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):89736
                                                                                                                                                                                                                            Entropy (8bit):5.522767465825831
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:3urhT5+KybRpnE8K74kca7NerB8iXpYmRRXvdi82BSOe9oKSJ2SLD0BEZWkAzrF9:w+KY04RMmSCYmBiF4O7WTn8K/CI
                                                                                                                                                                                                                            MD5:2CC3AC572A2170108BABD019F0BFE779
                                                                                                                                                                                                                            SHA1:AF962245CE32D5801A380FF7F6B8C87AC7772AB2
                                                                                                                                                                                                                            SHA-256:755315DFCC9C72CBE4EB33AF34E9AAC0BD1324C6942F4B56AD9FE0135E1A9299
                                                                                                                                                                                                                            SHA-512:891D545DDF35BF8C650FE8EB48A5E5F6F7C50036E42BE893417AF2EF886EB37C5BEEE9DD838A8F020728E4BAE803F2753CC8F6DD7958DD31B5B39DAED7EF464B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L..."..."..."....."......"......"...#.S."....."..`\..."......"......".Rich..".................PE..L...#.pK.................l..........Td.......................................P......0a....@...... ..........................lm..........p............0.......@...... ...............................0...@............................................text... j.......l.................. ..`.data...4............p..............@....rsrc...p............v..............@..@.reloc.......@.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):323472
                                                                                                                                                                                                                            Entropy (8bit):6.260791393809843
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:xadPqy3/nKyWFZS3PCmxiVvUTiJ+1I2hWHlHTkPXdxs4:wqyAA3PCmwV8i41I2gHlHTkvdW4
                                                                                                                                                                                                                            MD5:128D06B8C5739F35A7C76A76BF1E6149
                                                                                                                                                                                                                            SHA1:901F9698BF4C4A10E8E902E6DBDDF1782E1067D0
                                                                                                                                                                                                                            SHA-256:BF585DBC4E4DCE47F9EFDEEAD15F67A69644CE6F1177CEEC518882DC85ECC096
                                                                                                                                                                                                                            SHA-512:ECE9254486347751D6F68AE86AFB36508FED81B00C4588F555DB584A0E9DE5F4710A24E6BB5B2B19A25BEE20AA4BF90068F9EB2E37B48271614B6C97199E419C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.........................Y...........>w......>w......>w..............<...........u....p.......p.......p......p......Rich............................PE..d...Y.wf.........." ...(.............5....................................... ............`..........................................t......0u..<...............L/..................P...........................(.......@............@..P............................text...0,.......................... ..`.rdata...B...@...D...2..............@..@.data...X6....... ...v..............@....pdata..L/.......0..................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):8184456
                                                                                                                                                                                                                            Entropy (8bit):6.15917051663501
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:98304:AD3K0YyOAYcd0ZLpNu6JmM1W8YcTpOG7ZE78O:ALzUwsFYc9OG7ZE78O
                                                                                                                                                                                                                            MD5:5850A25689FA1B36CD6B76E2E7F6BDB3
                                                                                                                                                                                                                            SHA1:299CEBD4CD448239BF5094DCC0632100287C0B85
                                                                                                                                                                                                                            SHA-256:803870B4FCC1A8C0675EE1D5AA5DEB4132514974CDF0F8F7BA40035377FFDCFA
                                                                                                                                                                                                                            SHA-512:F64A196D0FE937112604D7B0CFE2099928987ECEAA650728C88ECE9BAEF288AF2E4BCDD52D3199D8787290F5071287DAFA5DC6FD44775E52CA1E04237411888F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Yara Hits:
                                                                                                                                                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmp, Author: Joe Security
                                                                                                                                                                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Program Files\FastestVPN\Resources\is-QOP0D.tmp, Author: ditekSHen
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........].......".......'..........=........@.......................................}...`... ...............................................c.|.... d.t.............|...... c.....................................................`SY.@............................text.....'.......'................. ..`.rdata..PC1...(..D1...'.............@..@.data... ....PY......0Y.............@....idata..|.....c.......\.............@....reloc....... c.......\.............@..B.symtab.......d.......]................B.rsrc...t.... d.......].............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):359
                                                                                                                                                                                                                            Entropy (8bit):5.09733291062762
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:i4Z2TyUdkl9WUyUdkwc1+XMoHkyUdk3LASg0TqeXMFXA98XfFZ/FvjCzISMOmEm:jZELklIULktkXxELk35q0MhA98vFZ/FV
                                                                                                                                                                                                                            MD5:777B3CBF81DDD8B238BDEDDDEA17AFED
                                                                                                                                                                                                                            SHA1:C72F46715DCBC9BDA1E2BEEAC8AF2A64E7B48D08
                                                                                                                                                                                                                            SHA-256:DACE14B4A5268728E67A9E78D8F0877F4C87F6B87DDD40DFF28A11E9E42945CF
                                                                                                                                                                                                                            SHA-512:5C6D302F93381EBF65ADD3DAA0EB4813270C5D9A042AD9B8A48A575ADC4E751D3834292BB61AEF6A5458036AE6E3C83C8EDFAE5CF828D81317ACAE6675B8E619
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:If (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))..{ ..$arguments = "& '" + $myinvocation.mycommand.definition + "'"..Start-Process powershell -Verb runAs -ArgumentList $arguments..Break..}.. Set-NetConnectionProfile -NetworkCategory Private
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):68744
                                                                                                                                                                                                                            Entropy (8bit):6.03232541602541
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:OhNHth2MbtFwpJgYCV7JToLDkhqQovzeTJdCK/C1:OhHTbtsRCskcQovzeTJdCK/a
                                                                                                                                                                                                                            MD5:41E94A80206A87D947CE6CF5823494BE
                                                                                                                                                                                                                            SHA1:558214579EE8F2732C36F779E545BA1340191E49
                                                                                                                                                                                                                            SHA-256:E4275E6430AE1EC21A5CD0F2FC382998DEBC1E433A66129527C1B69792F09F95
                                                                                                                                                                                                                            SHA-512:54B0DD18BA43C48B3FC21E4366D7D1DC65147A84AFA3DC29D94C4CF80B49FA67150B8303F576683F712E648CAFF516BFEA3A6F93435D6B33DCAB2C43BC762E35
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........z..h...h...h.......h......h......h......h......h......h.......h...h..ih.......h.......h...h...h.......h..Rich.h..........PE..d.....b.........."......r...|.......v.........@.............................@............`.................................................x...T.... .......................0..p...................................@...8............................................text....p.......r.................. ..`.rdata...W.......X...v..............@..@.data...............................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..p....0......................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):93832
                                                                                                                                                                                                                            Entropy (8bit):5.48517352660103
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:kP2K0pa0WfEYp9Y/XQhpgnbP212YCJpDhiF4O7WGHK/CT:kePOYe4bu1epDh8RWGHK/M
                                                                                                                                                                                                                            MD5:A2ADF4897942B99FE0738F8C37FD15C0
                                                                                                                                                                                                                            SHA1:4192A2221F5C48A16427BF1898C0443CA27A29BB
                                                                                                                                                                                                                            SHA-256:B339B9A93A93B52F3EA0A5F2161E4B16BDA0CA7396D53ECA14C7D7F3E963A3A3
                                                                                                                                                                                                                            SHA-512:DF383B4B70C980C613F3C3EC4E99980DA6DB15F123D617197B644314233D1E2ADEC9F9162D6DBB7B874D885119082E01840102F0976F3CC767A78B5E467EF4A8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X...9...9...9...AF..9...AW..9...A@..9...9..f9...AP.9...AY..9.......9...AG..9...AB..9..Rich.9..........................PE..d.....pK.........."......~...........s.......................................p......r.....@.......... ......................................X}..........p.......T....@.......`......0................................................................................text....|.......~.................. ..`.data...x...........................@....pdata..T...........................@..@.rsrc...p...........................@..@.reloc..p....`.......>..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):589712
                                                                                                                                                                                                                            Entropy (8bit):6.371606969587959
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:Qnu0YqCbnvh0xDqjFR0NdzhdkPJZIR0vnrXkcc9VNLqYWTF:Qu0YqInZCD7mZI0vnrPc9VNLqYWB
                                                                                                                                                                                                                            MD5:EAB165F7A1856FC4FC191416A26F20F3
                                                                                                                                                                                                                            SHA1:3E3BAAA9A8AE20680D4B347A3A65E4A388DC0F4D
                                                                                                                                                                                                                            SHA-256:A2C87DFE4D43C7CC8AC44F2AC43BD45EC4F3F6BA87A2C73AE8B55F26286600E9
                                                                                                                                                                                                                            SHA-512:897E0F107BEB1FCC6402183C535F2550E954B379451415E8B40403D0575EFA6E1D1373F9F0B9A0649AB09515259490C7BFB9E9926F76735EE513F68460FB5143
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:q..T"..T"..T"..W#..T"..Q#W.T"7MW#..T"7MP#..T"7MQ#..T"..P#..T"..U#..T"5.U#..T"..U"T.T".JQ#..T".JT#..T".J."..T".JV#..T"Rich..T"................PE..d.....wf.........." ...(.....P.......8.......................................@............`..........................................\..x...8]....... ..........tF...........0......@...........................(.......@............................................text............................... ..`.rdata..2...........................@..@.data....C.......,...^..............@....pdata..tF.......H..................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):313744
                                                                                                                                                                                                                            Entropy (8bit):6.2705364965004815
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:7OqwvZdI0CglL0fN5ra4KBb5cSgQkJjMoplVNLQDrkHW:6qwvigF0fN5OB5dgQkBplVNLQDeW
                                                                                                                                                                                                                            MD5:2EEEB7F9DCC44DC28CBFBAF94176CA6F
                                                                                                                                                                                                                            SHA1:65055D6EE4E5A322DB3C74B0EF8CDADECDB32737
                                                                                                                                                                                                                            SHA-256:966DDE59F9ABD125F763A95273BF923C2543A4B9F43F6F0C5587CCA308BD9FFD
                                                                                                                                                                                                                            SHA-512:5919481A1768E9B19CE79ADDDFFC25A6BCDA326232FEB6E61729C2173292F3E2EC7266C646090DCC061A2E9643084583E43947774FDF76842316249B3B2E911F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@D..%...%...%...U...%...U..%...U...%......%......%.....H%...U...%...Y...%...%..}%.......%.......%....v..%.......%..Rich.%..................PE..d...t.wf.........." ...(.................................................................`.........................................0].......]..P................,..............................................(.......@............0..x............................text...,........................... ..`.rdata..h;...0...<..................@..@.data....7...p.......T..............@....pdata...,...........r..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3490952
                                                                                                                                                                                                                            Entropy (8bit):6.105770368598401
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:+VwASO4GIU6injGtlqBGqgOtUyrQ8SFJnofeT5W7aTNP6nZsi61o1CPwDv3uFfJe:xB+btBQQ7UQnZsY1CPwDv3uFfJe
                                                                                                                                                                                                                            MD5:474D774A60BCBDBB326C248D1B86C785
                                                                                                                                                                                                                            SHA1:C8611E2BEA720BB3B8768BB7F347DE04EAB8B00D
                                                                                                                                                                                                                            SHA-256:4FB11C716E57A352D0C40B83F00B73A23B16F4418247AFB0E8CA114C20ED7414
                                                                                                                                                                                                                            SHA-512:D25EFAE915E303AB98F86A3131E5C128BFFB0FEE7317C2F28D7A9C9836186C46FDB64008BE98EBF1B7C97F809AD4A170929583B5B899427C405C90503D3D39E0
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.Q.5.?.5.?.5.?.<..'.?.g.>.7.?.g.:.>.?.g.;.=.?.g.<.1.?.!.>.8.?.5.>.?.5.?.+.?...;.N.?...?.4.?.....4.?...=.4.?.Rich5.?.........................PE..d...g..b.........." .....p%...................................................5.......5...`...........................................0..h....4.T.....5.|.....3.......5...... 5..P..T.-.8.............................-.8.............4..............................text....o%......p%................. ..`.rdata........%......t%.............@..@.data....~....2..0...t2.............@....pdata........3.......2.............@..@.idata..T'....4..(...h4.............@..@.00cfg..Q.....5.......4.............@..@.rsrc...|.....5.......4.............@..@.reloc...z... 5..|....4.............@..B................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):2276496
                                                                                                                                                                                                                            Entropy (8bit):6.2839627604807955
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:sqrGLY4rzqgpJdli4OLz1/SK1ULLnLWdaqTv6akDCbpCX464lnbW148y1PuDT5Wg:sqr0Y4rugpJdli4OLz1/SK1ULLLWdaq8
                                                                                                                                                                                                                            MD5:A928351F9555A07B7A8DCEA6B209D367
                                                                                                                                                                                                                            SHA1:66379948FB082D9EB390B77C4E00EFAD25062C9C
                                                                                                                                                                                                                            SHA-256:8993C69DAA63314019E3D33190140ACAC23704D20AB3BDF946B41969DD23B0A7
                                                                                                                                                                                                                            SHA-512:099DAD1E89474F449EF9EA35CC93C2C8A643AF9108FD38FFB7B748FE93F0A25553B135AC6C6E33EDB8B1AD55687CDF182C6FA3E2D5018110D0500C3E2CA35EEA
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.Y.p...<.....!.............0................(c.........................@........"...@... .........................A....P..........@.............".....................................p.......................R..h............................text...............................`.p`.data...|d.......f..................@.`..rdata..T............d..............@.`@.bss.........`........................`..edata..A............B..............@.0@.idata.......P......................@.0..CRT....,....`......................@.0..tls.... ....p......................@.0..rsrc...@...........................@.0..reloc.............................@.0B/4...........@......................@..B/19......i...P...j..................@..B/31..................,..............@..B/45..................@..............@..B/57..................R..............@.0B/70.....2............Z..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):178552
                                                                                                                                                                                                                            Entropy (8bit):6.1636094237053305
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:2h5CDZ37FRuI7hDEjQ777RZ7B7T7N55Fjh/YAWFOEBhzFJEB55jKTrK/T:J3bRn9ZNnB5NfKTW/T
                                                                                                                                                                                                                            MD5:3D0E093C2EA9BE7460BFBAD86E6FBB58
                                                                                                                                                                                                                            SHA1:C36EB5601DF523DE321146CF1853F899921AB519
                                                                                                                                                                                                                            SHA-256:810DD30ED0002E2D71937EA818F77E60B0D385D32CC61D92A466FCB6FDCE5526
                                                                                                                                                                                                                            SHA-512:CF4A35C0FAA30FE2B96F2A04E91AFCF9CD08ADF021031C1CEFEF8E2F4028381FD1DEABA7B744AB2245B60A623715CDE8B7C8C9D7AE52728701D773F4B26367BB
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........-......#.....L...................`.....l......................................@... .........................H.......................................t...................................................................................text....K.......L..................`.p`.data........`.......P..............@.0..rdata..,....p.......R..............@.`@.bss..................................`..edata..H............f..............@.0@.idata...............v..............@.0..CRT....,............|..............@.0..tls.... ............~..............@.0..reloc..t...........................@.0B........................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):113800
                                                                                                                                                                                                                            Entropy (8bit):6.497871168162335
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:NADrSog8rBPCmGxRmZZlfzaag8fPrZyEOE9toSK/G:qDl9PQTmZ53rZyEOE92L/G
                                                                                                                                                                                                                            MD5:C966B6A5F0143199FF16F8E491E2B44D
                                                                                                                                                                                                                            SHA1:A47ECE66964E5432551E782EC53EBFEA42845256
                                                                                                                                                                                                                            SHA-256:EA7E53C74D1E66FB0363A16DCCB2B893183937BF4A69770EA44D6BCD6C1A15D6
                                                                                                                                                                                                                            SHA-512:54292A35794B0E147BDCDE724D7101FEDD499F5799175545C5E2BB4362D6387B713EBF511EBF25B4D7E41086073E167524C401936623BB3AE8E337E3D5ADE5CF
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........hw...........q......|......|......|......|.....P|.....b............P|.....P|.....P|.....P|.....Rich............PE..d......b.........." ................................................................."....`..........................................p.......}.......................................Y...............................Z..8............................................text............................... ..`.rdata..z...........................@..@.data...(............t..............@....pdata...............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):700040
                                                                                                                                                                                                                            Entropy (8bit):5.552155208041958
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:UB4x/cH7gueaxFi00ZoPqETRzRnYhUpfakLaugPoDhTMY98c8mvVfU2lvzpi/O:avziRZoXuugCtD8JmvNU2lvzpiG
                                                                                                                                                                                                                            MD5:6EE5C92E2918B27974086A6F24D79043
                                                                                                                                                                                                                            SHA1:40595B75A513BBF1BE16780784E13EFDAD2E40C7
                                                                                                                                                                                                                            SHA-256:86F3A19221C710CFF12607FEB00D8CD0AF932873430AD1B59C990593010EC3CF
                                                                                                                                                                                                                            SHA-512:F07BBE5D367D6F7474E08507F3827BDCAC5503673F2027CA139303FA573F4EEB7D82A9D88EE0F3291F53629C0644B39E2C81380B45F8E2A286FFCC326AE0E4B7
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............]...]...]..M]...]..\...]...\...]..\...]..\...]..\...]H..\...]...]o..]H..\...]H..\...]H.!]...]H..\...]Rich...]........PE..d...g..b.........." .....:...L......<.....................................................`..........................................+...N..@E..........s........L..............h.......8...........................@...8............0..@............................text....8.......:.................. ..`.rdata...)...P...*...>..............@..@.data...QM.......D...h..............@....pdata...T.......V..................@..@.idata..*W...0...X..................@..@.00cfg..Q............Z..............@..@.rsrc...s............\..............@..@.reloc..]............d..............@..B................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):244360
                                                                                                                                                                                                                            Entropy (8bit):6.534833630270433
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:lE2PcqwWvsYJlWewlEyDFINgMjY/fVYPCtmA+KiA/R:lE+1JYVEgFugMjXP/A0A/R
                                                                                                                                                                                                                            MD5:92CAE75041DFA888EE8284E7C6BB658E
                                                                                                                                                                                                                            SHA1:2632FD77EAEDC09977192CFAA19EAEE66F538041
                                                                                                                                                                                                                            SHA-256:ACEB2DBBA3948EF0D2908CAE3B2E1586AC82B700C1DE7E6420FA241EFBBB0ECB
                                                                                                                                                                                                                            SHA-512:F01AC04FBD3EA1FD4D39D7654DF7D97EB15D60BC9EDFDF36C92176CF8A66FC148E4ECA480F52B7283AF1B9966983F4275A4E221E2D73056A7F3F4290C4D85C17
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R."K...........#...8............`..............k................................Ub........ ......................P.. ....p...$...................................................................................................................text...t...........................`.P`.data...0%.......&..................@.`..rdata..x^.......`..................@.`@.bss.........@........................@..edata.. ....P.......*..............@.0@.idata...$...p...&...H..............@.0..reloc...............n..............@.0B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):776328
                                                                                                                                                                                                                            Entropy (8bit):6.92032788063544
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:uQmCy3NeRjkpQmj3oaMtQqjoygfXq3kon9IlbgaOxQdVJJ6j5EBKX8hUk/K:vmCy3VQs9MtLjTgfa3kon9FaOdEukC
                                                                                                                                                                                                                            MD5:6ECA26F16FEB505B1BD0A0A25DA4AEDB
                                                                                                                                                                                                                            SHA1:297A6E0D660FAF9E924B2BE827D9D9DC81E4EB85
                                                                                                                                                                                                                            SHA-256:CD9005B83CAB43E566F287D1BB1A3DE33F2D67AD5013DC5213232A5DC5309BDB
                                                                                                                                                                                                                            SHA-512:78F749E1D591D9AC2C1BB3A47FA7D4099A18303357F990E97D6E531FA50FE2466C8A203504F599C74EE92DFA179CC4AFBC561C60AFD01FA103A3276E79760A46
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ R.HA<.HA<.HA<.A9..KA<.HA=..A<.'7..@<.'7...A<.'7..|A<.'7...A<.'7..IA<.'7..IA<.'7..IA<.RichHA<.........PE..L.....K.........."!................. ....... .....x................................m.....@..........................I......D...(............................... L..h...8...........................pE..@............................................text............................... ..`.data...|Z... ...N..................@....rsrc................X..............@..@.reloc.. L.......N...\..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):918536
                                                                                                                                                                                                                            Entropy (8bit):6.038516348303836
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:Kts+IUZyyi1sznLRjH0qawdB1iT7jwq7Kjn+o/J:KtLIUZPyaVH0qawP1iDwjn+oh
                                                                                                                                                                                                                            MD5:6F1B7C24C5FF662F4364B323F42C101A
                                                                                                                                                                                                                            SHA1:B74949B7A809F8139BD89BD5B96E230108A6615D
                                                                                                                                                                                                                            SHA-256:034248CEFD5BC35A927682E44B79C354A0AEE25E800CF99D86EC591FD8722B5A
                                                                                                                                                                                                                            SHA-512:B13B4A46FB14C687925DE21982C4DE66C201E9FE16D7C03B2C65900CEF47C5E6DB338545E868EE6216C2A92453557BEA6C0D084B5D76A731CAA00BA821FA40E0
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.Y...../...................H................@.................................n.....@... .........................N.......(................................a...................................................#..`............................text...............................`.P`.data....%.......&..................@.`..rdata..D...........................@.`@.bss.....G............................`..edata..N...........................@.0@.idata..(...........................@.0..CRT....4...........................@.0..tls.... ............0..............@.0..reloc...a.......b...2..............@.0B/4...........P......................@..B/19..........`......................@..B/31.....]............8..............@..B/45.......... .......T..............@..B/57..........@.......p..............@.0B/70..........P.......x..............@..B/81..........`.......~..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):865416
                                                                                                                                                                                                                            Entropy (8bit):6.558002511161394
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:dxRZrLEvOx+pFpQlzLyPkET7c5zaSjLUVaoNkUNBKsEpX:dtUmxmpQFLyPkEixWi
                                                                                                                                                                                                                            MD5:A151697A9F14639BFA2CB3E470CEA355
                                                                                                                                                                                                                            SHA1:FA45D614ABFF2ED9A707E3DFC02F404CFC18A89F
                                                                                                                                                                                                                            SHA-256:4794C710A3E624B1A0D956CFE21EC0433FD85BD2D8EB96ACE3F2B5E5302E225C
                                                                                                                                                                                                                            SHA-512:888CFD3919482BB56A15E23A73C868C277CA925EED122327E3399C23D0D647F07B9CD67CCAE28AFD1048A41710DA50126B38E75D7455F56AA95BBECA42D228BF
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........*.w.K.$.K.$.K.$.3.$.K.$.>.%.K.$.$l$.K.$.>.%.K.$.>.%.K.$.>.%.K.$w>.%.K.$w>.%.K.$. .%.K.$. .%.K.$.K.$.I.$w>.%.K.$w>.%.K.$w>n$.K.$w>.%.K.$Rich.K.$................PE..d.....b.........."...........................@....................................q.....`.........................................Pd..P....d..........8....P...^..................................................`...8............................................text.............................. ..`.rdata..^...........................@..@.data...............................@....pdata...^...P...`..................@..@.rsrc...8...........................@..@.reloc..............................@..B................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):68744
                                                                                                                                                                                                                            Entropy (8bit):6.03232541602541
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:OhNHth2MbtFwpJgYCV7JToLDkhqQovzeTJdCK/C1:OhHTbtsRCskcQovzeTJdCK/a
                                                                                                                                                                                                                            MD5:41E94A80206A87D947CE6CF5823494BE
                                                                                                                                                                                                                            SHA1:558214579EE8F2732C36F779E545BA1340191E49
                                                                                                                                                                                                                            SHA-256:E4275E6430AE1EC21A5CD0F2FC382998DEBC1E433A66129527C1B69792F09F95
                                                                                                                                                                                                                            SHA-512:54B0DD18BA43C48B3FC21E4366D7D1DC65147A84AFA3DC29D94C4CF80B49FA67150B8303F576683F712E648CAFF516BFEA3A6F93435D6B33DCAB2C43BC762E35
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........z..h...h...h.......h......h......h......h......h......h.......h...h..ih.......h.......h...h...h.......h..Rich.h..........PE..d.....b.........."......r...|.......v.........@.............................@............`.................................................x...T.... .......................0..p...................................@...8............................................text....p.......r.................. ..`.rdata...W.......X...v..............@..@.data...............................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..p....0......................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):27784
                                                                                                                                                                                                                            Entropy (8bit):6.488306745612165
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:YVfdXePAee0fxvSDv2atBymU+DpbGEgivBpnpwK3CrFqa2S0FP27NBYearrDVY:afdXfOvObbU+Nb5RgrFq7rK/YfrDS
                                                                                                                                                                                                                            MD5:41C55E2A9D5D9B23C08E3DC067780DC7
                                                                                                                                                                                                                            SHA1:1FB62C7FCF24F604676896121C1CCAFB628C1BE1
                                                                                                                                                                                                                            SHA-256:D76995DCE5A5A3B0D77ABB438C14504F9825A6BC98676F1BA8D0CC18CEBB0545
                                                                                                                                                                                                                            SHA-512:396E8878BAFCFC0DF994B9AF23176D343230B6F6EE82A71E14EFA56347EF0C63B4D277C029EF9FB3EF69D6F1B8AE73ECF92D8DCEDC9312E0C8BFA86EC0B611D2
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7X.................6...........T... ...`....@.. ....................................@..................................T..K....`...............>............................................................... ............... ..H............text....4... ...6.................. ..`.rsrc........`.......8..............@..@.reloc...............<..............@..B.................T......H........1..."..........|0..p...........................................6.(.....(....*...0..S............(....o.....s.......o....s.......o......o.........&..o............9.....o.....*.......#..6........../E.......0..E............(....o.....s.......o....s.......o.........&........9.....o.....*.........#../..........!7.......0..M.......~....s......o.....;.....o......#......$@(....o.........&........9.....o.....*...........,7..........4?.......0..M.......~....s......o.....;.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):545680
                                                                                                                                                                                                                            Entropy (8bit):6.371479071684404
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:8xqABhfuM6KsuJPR9K+EvLHhDcsgsEO5CllKDh/eF4:8xqDM9+lHNcsgACllKDh/eF4
                                                                                                                                                                                                                            MD5:2D885495E81A8B8D1D5305FE20566484
                                                                                                                                                                                                                            SHA1:F1D2083D399DD48927CBD83E23F90AD3CE3E0632
                                                                                                                                                                                                                            SHA-256:EB2E18881DDD80A3E54527264B3E7C5046F15854A196B76CCAD28E8258F3F1B2
                                                                                                                                                                                                                            SHA-512:E2BB9F8E377B381CC13538B39E8B3FB749341FCEF84E7B26749BF35141C6C52A48636BB00C6FA7C585EEC4C01B03CD0EC38C8F3E85E0CA2C2CDA26D026DEF326
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Do!O..O...O...O..~L...O..~J...O..~K...O..L...O..K...O..J.K.O..~N...O..rN...O...N.y.O...J...O...O...O.......O...M...O.Rich..O.........................PE..d...|.wf.........." ...(.&...&......................................................$D....`.............................................|.......P....p....... ..TB...8..........P...p........................ ..(...0...@............@...............................text...P$.......&.................. ..`.rdata.......@.......*..............@..@.data...tA.......*..................@....pdata..TB... ...D..................@..@.rsrc........p.......&..............@..@.reloc..P............(..............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):77064
                                                                                                                                                                                                                            Entropy (8bit):6.309512423177142
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:c3PLyOk59e89l4oTvomRuJeE3dwifb2CLXlYvcM:ML45g0lKPLwifb2CLXcx
                                                                                                                                                                                                                            MD5:760475CD23CE23410F37558452B28545
                                                                                                                                                                                                                            SHA1:68ED3626CE9ABE090B960EEB909C4324205DDEF0
                                                                                                                                                                                                                            SHA-256:113A6934823339B6873D8CE80F629F37BFA912C4B8201428222025754BFEFA7F
                                                                                                                                                                                                                            SHA-512:AB9AEF1013B579784C062D2ED30DAB86DAE541862B7C02FF19943D0987A5C7FC8B12A2C8ABCDB521123DB2E8BC1B806834C80E6C43C33164A004D37A59AE725A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2.#Rv.M.v.M.v.M.v.L...M.....q.M.....r.M.....s.M.......M.....w.M.....w.M.Richv.M.........................PE..d....m.\.........."..........0......d0.......................................`...............................................................0..P....@....... ...............P......P...................................................H............................text...n........................... ..h.rdata..D...........................@..H.data...............................@....pdata....... ......................@..HINIT....d....0...................... ....rsrc........@......................@..B.reloc.......P......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):77064
                                                                                                                                                                                                                            Entropy (8bit):6.309512423177142
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:c3PLyOk59e89l4oTvomRuJeE3dwifb2CLXlYvcM:ML45g0lKPLwifb2CLXcx
                                                                                                                                                                                                                            MD5:760475CD23CE23410F37558452B28545
                                                                                                                                                                                                                            SHA1:68ED3626CE9ABE090B960EEB909C4324205DDEF0
                                                                                                                                                                                                                            SHA-256:113A6934823339B6873D8CE80F629F37BFA912C4B8201428222025754BFEFA7F
                                                                                                                                                                                                                            SHA-512:AB9AEF1013B579784C062D2ED30DAB86DAE541862B7C02FF19943D0987A5C7FC8B12A2C8ABCDB521123DB2E8BC1B806834C80E6C43C33164A004D37A59AE725A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2.#Rv.M.v.M.v.M.v.L...M.....q.M.....r.M.....s.M.......M.....w.M.....w.M.Richv.M.........................PE..d....m.\.........."..........0......d0.......................................`...............................................................0..P....@....... ...............P......P...................................................H............................text...n........................... ..h.rdata..D...........................@..H.data...............................@....pdata....... ......................@..HINIT....d....0...................... ....rsrc........@......................@..B.reloc.......P......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (native) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):72304
                                                                                                                                                                                                                            Entropy (8bit):6.723888135179154
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:IPxegyYti+IPp+RmwN/jlzQH8rzn3oZrx+vJcRUf:jgLQPp+EwN5K8rcZrmq
                                                                                                                                                                                                                            MD5:5EE29684A6D1E66FD1590742620448EE
                                                                                                                                                                                                                            SHA1:71DB43CA9730411BADD39AB2631A1346EF740AAA
                                                                                                                                                                                                                            SHA-256:3506C17F79A4F38482DE5B5835484C7127B9903A9412FB6B668BE441D83D8B30
                                                                                                                                                                                                                            SHA-512:5F0E00DAC143ED9995B5FECD023EA950FC7A37691E5A4DEF24DAB0DCBDE058787CD4997BE8B2BBE948E5CCA96E80112F55BA8DE7BDD39D264709813B67FDDC0D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..f;..f;..f;..f:..f;......f;......f;......f;......f;......f;.Rich.f;.........................PE..L....m.\.....................,......>.......................................................................................P...d.......................p:..........................................0...@............................................text............................... ..h.rdata..`...........................@..H.data...............................@...INIT................................ ....rsrc...............................@..B.reloc..^...........................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (native) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):72304
                                                                                                                                                                                                                            Entropy (8bit):6.723888135179154
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:IPxegyYti+IPp+RmwN/jlzQH8rzn3oZrx+vJcRUf:jgLQPp+EwN5K8rcZrmq
                                                                                                                                                                                                                            MD5:5EE29684A6D1E66FD1590742620448EE
                                                                                                                                                                                                                            SHA1:71DB43CA9730411BADD39AB2631A1346EF740AAA
                                                                                                                                                                                                                            SHA-256:3506C17F79A4F38482DE5B5835484C7127B9903A9412FB6B668BE441D83D8B30
                                                                                                                                                                                                                            SHA-512:5F0E00DAC143ED9995B5FECD023EA950FC7A37691E5A4DEF24DAB0DCBDE058787CD4997BE8B2BBE948E5CCA96E80112F55BA8DE7BDD39D264709813B67FDDC0D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..f;..f;..f;..f:..f;......f;......f;......f;......f;......f;.Rich.f;.........................PE..L....m.\.....................,......>.......................................................................................P...d.......................p:..........................................0...@............................................text............................... ..h.rdata..`...........................@..H.data...............................@...INIT................................ ....rsrc...............................@..B.reloc..^...........................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):104424
                                                                                                                                                                                                                            Entropy (8bit):6.366713641084616
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Y79hJ78bsmPOC5lhtb5FGNk4wZO+cWK4orE3HazVvon6BK2s6th:YpL78XPOCN1GeOUKdebIKfS
                                                                                                                                                                                                                            MD5:95FD4F27F82A9E4D6E2A53AF7A9096E6
                                                                                                                                                                                                                            SHA1:5F772C89901841AF1814C858359AC5FEB9BE3C24
                                                                                                                                                                                                                            SHA-256:98CD2F27906E4FD7FA7FBE0EC747BADEF710BCA736A1AC5EE883756F2185818C
                                                                                                                                                                                                                            SHA-512:6B2E2BA90B33F6658C903203317299057C83545D46549D468CDAA1D6F7BCE887310411B9BF6EEA9D19C214A2041BB5E14FD9395CC4E2FE9FC31AB03B88A75019
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.d.z...z...z.....~...z.........}.....}...Y@..s....A..{....A..{...Richz...........................PE..d... [.\.........."..........L.................@....................................C.....`.................................................8p..P.......H....`.......R...E..........`#..8............................(..p............ ..`............................text...d........................... ..h.rdata....... ......................@..H.data...@....@.......$..............@....pdata.......`.......,..............@..HINIT.........p.......:.............. ....rsrc...H............J..............@..B.reloc...............P..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):104424
                                                                                                                                                                                                                            Entropy (8bit):6.366713641084616
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Y79hJ78bsmPOC5lhtb5FGNk4wZO+cWK4orE3HazVvon6BK2s6th:YpL78XPOCN1GeOUKdebIKfS
                                                                                                                                                                                                                            MD5:95FD4F27F82A9E4D6E2A53AF7A9096E6
                                                                                                                                                                                                                            SHA1:5F772C89901841AF1814C858359AC5FEB9BE3C24
                                                                                                                                                                                                                            SHA-256:98CD2F27906E4FD7FA7FBE0EC747BADEF710BCA736A1AC5EE883756F2185818C
                                                                                                                                                                                                                            SHA-512:6B2E2BA90B33F6658C903203317299057C83545D46549D468CDAA1D6F7BCE887310411B9BF6EEA9D19C214A2041BB5E14FD9395CC4E2FE9FC31AB03B88A75019
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.d.z...z...z.....~...z.........}.....}...Y@..s....A..{....A..{...Richz...........................PE..d... [.\.........."..........L.................@....................................C.....`.................................................8p..P.......H....`.......R...E..........`#..8............................(..p............ ..`............................text...d........................... ..h.rdata....... ......................@..H.data...@....@.......$..............@....pdata.......`.......,..............@..HINIT.........p.......:.............. ....rsrc...H............J..............@..B.reloc...............P..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):104424
                                                                                                                                                                                                                            Entropy (8bit):6.366713641084616
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Y79hJ78bsmPOC5lhtb5FGNk4wZO+cWK4orE3HazVvon6BK2s6th:YpL78XPOCN1GeOUKdebIKfS
                                                                                                                                                                                                                            MD5:95FD4F27F82A9E4D6E2A53AF7A9096E6
                                                                                                                                                                                                                            SHA1:5F772C89901841AF1814C858359AC5FEB9BE3C24
                                                                                                                                                                                                                            SHA-256:98CD2F27906E4FD7FA7FBE0EC747BADEF710BCA736A1AC5EE883756F2185818C
                                                                                                                                                                                                                            SHA-512:6B2E2BA90B33F6658C903203317299057C83545D46549D468CDAA1D6F7BCE887310411B9BF6EEA9D19C214A2041BB5E14FD9395CC4E2FE9FC31AB03B88A75019
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.d.z...z...z.....~...z.........}.....}...Y@..s....A..{....A..{...Richz...........................PE..d... [.\.........."..........L.................@....................................C.....`.................................................8p..P.......H....`.......R...E..........`#..8............................(..p............ ..`............................text...d........................... ..h.rdata....... ......................@..H.data...@....@.......$..............@....pdata.......`.......,..............@..HINIT.........p.......:.............. ....rsrc...H............J..............@..B.reloc...............P..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):104424
                                                                                                                                                                                                                            Entropy (8bit):6.366713641084616
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Y79hJ78bsmPOC5lhtb5FGNk4wZO+cWK4orE3HazVvon6BK2s6th:YpL78XPOCN1GeOUKdebIKfS
                                                                                                                                                                                                                            MD5:95FD4F27F82A9E4D6E2A53AF7A9096E6
                                                                                                                                                                                                                            SHA1:5F772C89901841AF1814C858359AC5FEB9BE3C24
                                                                                                                                                                                                                            SHA-256:98CD2F27906E4FD7FA7FBE0EC747BADEF710BCA736A1AC5EE883756F2185818C
                                                                                                                                                                                                                            SHA-512:6B2E2BA90B33F6658C903203317299057C83545D46549D468CDAA1D6F7BCE887310411B9BF6EEA9D19C214A2041BB5E14FD9395CC4E2FE9FC31AB03B88A75019
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.d.z...z...z.....~...z.........}.....}...Y@..s....A..{....A..{...Richz...........................PE..d... [.\.........."..........L.................@....................................C.....`.................................................8p..P.......H....`.......R...E..........`#..8............................(..p............ ..`............................text...d........................... ..h.rdata....... ......................@..H.data...@....@.......$..............@....pdata.......`.......,..............@..HINIT.........p.......:.............. ....rsrc...H............J..............@..B.reloc...............P..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):527
                                                                                                                                                                                                                            Entropy (8bit):5.160291198458603
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:E9T9FHWvxBLzOY7WCKGWXOTIHcrV2/+1Of3T96TuGWYxBoeANyW:E9T9FHWJBLz9SC8zwV2sOD997YBFnW
                                                                                                                                                                                                                            MD5:39B9357BA2B8B640ACFAE47275B80C56
                                                                                                                                                                                                                            SHA1:0A80D68131736FB29C71D66CEBED9D59258F86DB
                                                                                                                                                                                                                            SHA-256:76E9F6F16C00F33BE1717AE60A1FAFA0F90609508F7D613556B145E4C89D103A
                                                                                                                                                                                                                            SHA-512:D3144461AC37E13100BE3444586163CCB8A6B767DCD0B7A26353172FD86C06D7AC31CD209C1E472B9DCAF0D5E3CCD80AF78A15B48BE72E4AFBBCB6747338DDCB
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..start sc stop fastestvpndriver..del %systemroot%\system32\drivers\fastestvpndriver.sys....reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && set ARCH=i386 || set ARCH=amd64..reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | find /i "Windows 7" > NUL && set OS=windows7 || set OS=windows8....xcopy /y driver\%OS%\%ARCH%\fastestvpndriver.sys %systemroot%\system32\drivers..release\nfregdrv.exe -u fastestvpndriver..release\nfregdrv.exe fastestvpndriver
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):527
                                                                                                                                                                                                                            Entropy (8bit):5.160291198458603
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:E9T9FHWvxBLzOY7WCKGWXOTIHcrV2/+1Of3T96TuGWYxBoeANyW:E9T9FHWJBLz9SC8zwV2sOD997YBFnW
                                                                                                                                                                                                                            MD5:39B9357BA2B8B640ACFAE47275B80C56
                                                                                                                                                                                                                            SHA1:0A80D68131736FB29C71D66CEBED9D59258F86DB
                                                                                                                                                                                                                            SHA-256:76E9F6F16C00F33BE1717AE60A1FAFA0F90609508F7D613556B145E4C89D103A
                                                                                                                                                                                                                            SHA-512:D3144461AC37E13100BE3444586163CCB8A6B767DCD0B7A26353172FD86C06D7AC31CD209C1E472B9DCAF0D5E3CCD80AF78A15B48BE72E4AFBBCB6747338DDCB
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..start sc stop fastestvpndriver..del %systemroot%\system32\drivers\fastestvpndriver.sys....reg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && set ARCH=i386 || set ARCH=amd64..reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | find /i "Windows 7" > NUL && set OS=windows7 || set OS=windows8....xcopy /y driver\%OS%\%ARCH%\fastestvpndriver.sys %systemroot%\system32\drivers..release\nfregdrv.exe -u fastestvpndriver..release\nfregdrv.exe fastestvpndriver
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):153
                                                                                                                                                                                                                            Entropy (8bit):4.487708026306449
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyW+jBFWRO5Na3ymIaKn/kuD/RAKaXyXshWoXnPTHaW:hiPFvL9FHza3fxBuZaXhZbaW
                                                                                                                                                                                                                            MD5:2D0CB38D144B0F1A34BD6F715D697658
                                                                                                                                                                                                                            SHA1:65B935BEEE274E0BB6C069CB8FC1022E187ECAE2
                                                                                                                                                                                                                            SHA-256:DFEE16836EBD2D8E76D0EE660F9B22154A3513591061FF9EF9E540094DDEA8F6
                                                                                                                                                                                                                            SHA-512:472D2F8D2C58BC96C100674995A580F0EA3A60F42971A850582CEDB4B9108D42F7CE8D87410203C50EAD3F16B9CA92F3DDB1B4D543F2418FEF6259E754359987
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..start sc stop fastestvpndriver..del %systemroot%\system32\drivers\fastestvpndriver.sys..release\nfregdrv.exe -u fastestvpndriver
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):61064
                                                                                                                                                                                                                            Entropy (8bit):6.255909242219927
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:2/Th9sBDRdQNV0nsDMmkL/DDI6ssEtnrFqnK/Yfrc:lRMVvRkLFWtr6K/Cg
                                                                                                                                                                                                                            MD5:9333F583E2D32A47276DCEC7C2391FD2
                                                                                                                                                                                                                            SHA1:8757F8136354B7F98407CEBFE8BDA6043972D88E
                                                                                                                                                                                                                            SHA-256:AF36609DF5F1F9375354E68E2B8EA57059E44DEC3D089CD9EA509F0816D71294
                                                                                                                                                                                                                            SHA-512:922578EFA998B4B92192F3A6839059C01406997F3DBEF0DE70C7BA3F6D73CBDEA04470CD6C214778AAB59EB7602AC354750AE5D97C66286F1215BC415B273222
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......zRl.>3..>3..>3.......3....l.$3....o.v3...<_.<3....y.;3..>3..q3....p.?3....z.?3..Rich>3..................PE..L....K.Q.................p...@......@.............@.................................{.......................................\...P...................................@...................................@............................................text....c.......p.................. ..`.rdata........... ..................@..@.data...|...........................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):159368
                                                                                                                                                                                                                            Entropy (8bit):6.430638214966169
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:MnVAyi4UNa5oIMLPX3CD+Y+tQJtbwhOt4SSyd7DK/+1:Msa+hPSDutIyhfq7+/k
                                                                                                                                                                                                                            MD5:E7C064693750D51F5AC901A0CF0A987A
                                                                                                                                                                                                                            SHA1:0FFE9BAE9054D779F60CE8E0E72D386401C0AF7D
                                                                                                                                                                                                                            SHA-256:6138C9EC5082350F9223E87991A779457662FAD1AE937ADFD7229DA509810A14
                                                                                                                                                                                                                            SHA-512:12E2CF49B1DA8BD4CEC556F1C816678B7E04D08ED71D94F5734DA6B73AE73E79EC09593CFCF2A27AF73C32645435CF52B127EFB8BACB94C9638249E1365A3CBB
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Jx.....................)......)..d...).."...............y...)......)......)......)......Rich............PE..L......]...........!........................................................`......8c.............................. ...........P.... ..`............@.......0......0..................................@............................................text...0|.......................... ..`.rdata...J.......P..................@..@.data...,6....... ..................@....rsrc...`.... ......................@..@.reloc...(...0...0..................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):159368
                                                                                                                                                                                                                            Entropy (8bit):6.430638214966169
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:MnVAyi4UNa5oIMLPX3CD+Y+tQJtbwhOt4SSyd7DK/+1:Msa+hPSDutIyhfq7+/k
                                                                                                                                                                                                                            MD5:E7C064693750D51F5AC901A0CF0A987A
                                                                                                                                                                                                                            SHA1:0FFE9BAE9054D779F60CE8E0E72D386401C0AF7D
                                                                                                                                                                                                                            SHA-256:6138C9EC5082350F9223E87991A779457662FAD1AE937ADFD7229DA509810A14
                                                                                                                                                                                                                            SHA-512:12E2CF49B1DA8BD4CEC556F1C816678B7E04D08ED71D94F5734DA6B73AE73E79EC09593CFCF2A27AF73C32645435CF52B127EFB8BACB94C9638249E1365A3CBB
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Jx.....................)......)..d...).."...............y...)......)......)......)......Rich............PE..L......]...........!........................................................`......8c.............................. ...........P.... ..`............@.......0......0..................................@............................................text...0|.......................... ..`.rdata...J.......P..................@..@.data...,6....... ..................@....rsrc...`.... ......................@..@.reloc...(...0...0..................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):61064
                                                                                                                                                                                                                            Entropy (8bit):6.255909242219927
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:2/Th9sBDRdQNV0nsDMmkL/DDI6ssEtnrFqnK/Yfrc:lRMVvRkLFWtr6K/Cg
                                                                                                                                                                                                                            MD5:9333F583E2D32A47276DCEC7C2391FD2
                                                                                                                                                                                                                            SHA1:8757F8136354B7F98407CEBFE8BDA6043972D88E
                                                                                                                                                                                                                            SHA-256:AF36609DF5F1F9375354E68E2B8EA57059E44DEC3D089CD9EA509F0816D71294
                                                                                                                                                                                                                            SHA-512:922578EFA998B4B92192F3A6839059C01406997F3DBEF0DE70C7BA3F6D73CBDEA04470CD6C214778AAB59EB7602AC354750AE5D97C66286F1215BC415B273222
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......zRl.>3..>3..>3.......3....l.$3....o.v3...<_.<3....y.;3..>3..q3....p.?3....z.?3..Rich>3..................PE..L....K.Q.................p...@......@.............@.................................{.......................................\...P...................................@...................................@............................................text....c.......p.................. ..`.rdata........... ..................@..@.data...|...........................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):153
                                                                                                                                                                                                                            Entropy (8bit):4.487708026306449
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:mKDD2G2FuyW+jBFWRO5Na3ymIaKn/kuD/RAKaXyXshWoXnPTHaW:hiPFvL9FHza3fxBuZaXhZbaW
                                                                                                                                                                                                                            MD5:2D0CB38D144B0F1A34BD6F715D697658
                                                                                                                                                                                                                            SHA1:65B935BEEE274E0BB6C069CB8FC1022E187ECAE2
                                                                                                                                                                                                                            SHA-256:DFEE16836EBD2D8E76D0EE660F9B22154A3513591061FF9EF9E540094DDEA8F6
                                                                                                                                                                                                                            SHA-512:472D2F8D2C58BC96C100674995A580F0EA3A60F42971A850582CEDB4B9108D42F7CE8D87410203C50EAD3F16B9CA92F3DDB1B4D543F2418FEF6259E754359987
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@echo off..@cd /d %~dp0..start sc stop fastestvpndriver..del %systemroot%\system32\drivers\fastestvpndriver.sys..release\nfregdrv.exe -u fastestvpndriver
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):585512
                                                                                                                                                                                                                            Entropy (8bit):6.002108518534667
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:kavF2w273DAx5at3y6/c1M94lh7NX06qkX/0IT7/5:kAF2w2jE5k3y6/cyinNXy4B7h
                                                                                                                                                                                                                            MD5:2C700BBCDA59BFE2CD7EBF9BAA5B2626
                                                                                                                                                                                                                            SHA1:72EFAA0E8652FB4ADC21E4484E7F63AA968F39D2
                                                                                                                                                                                                                            SHA-256:C9C59AB5B3369B97C85129F160491BD743B68DE1AD41EE6EEBA69009407B54E7
                                                                                                                                                                                                                            SHA-512:0911C7FED9653D9D50BAD7219E45778367DE4B105B5079A8011415F65465B80782A98A503CEBFB309997BCFB2A8620402579456565A24C69A20CBCBD0130DA20
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.Y...........!..............................`n.........................p......L.....@... .........................m).......3...0..@....................@...)........................... .......................................................text...T...........................`.P`.data....-..........................@.`..rdata..............................@.`@.bss....d.............................`..edata..m).......*...t..............@.0@.idata...3.......4..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...@....0......................@.0..reloc...)...@...*..................@.0B/4...........p......................@..B/19......l.......n..................@..B/31...../............v..............@..B/45.....|...........................@..B/57..........0......................@.0B/70.....2....@..........
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):277
                                                                                                                                                                                                                            Entropy (8bit):5.0491979415178765
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:ShdEdI5KGdXrSwCoXV+hn5A59eT5U+hLQsPti5FtEEs6EsctB6WEsF2WEsF+v:6dEKwGxOsw7BB6S2zv
                                                                                                                                                                                                                            MD5:C8768E552ABCA40175C704E4AF1F030C
                                                                                                                                                                                                                            SHA1:7B8A3BC3310EE72006FD2C5A4D5F4FC60171C81B
                                                                                                                                                                                                                            SHA-256:50259EEA13E0A9CB0AC48181F8F4345E6558EE8536CC71D0F6E2F63AE9D89D33
                                                                                                                                                                                                                            SHA-512:09FD06DB34894F1EC79B607217DC70E204793E04C58B846DC495DC915F38C1311AC1EE0D3C5CCDE636D8A3D6CE5631EF7291D3617FB3F900FD072CEA5831B573
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:OpenVPN STATISTICS..Updated,2023-09-03 07:45:36..TUN/TAP read bytes,1979..TUN/TAP write bytes,9103..TCP/UDP read bytes,15521..TCP/UDP write bytes,5150..Auth read bytes,9103..pre-compress bytes,0..post-compress bytes,0..pre-decompress bytes,204..post-decompress bytes,213..END..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):42120
                                                                                                                                                                                                                            Entropy (8bit):6.157445136592099
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:tFRn6+bvfApVjLj1mFU6rrFqyO9K/Yfryu:tFFepV3j1mm6/pO9K/COu
                                                                                                                                                                                                                            MD5:F6AFD5499FCC5D464085AD889BAE09B7
                                                                                                                                                                                                                            SHA1:287C540655FCED0C09DDA2D9C4EADD3F3E210B17
                                                                                                                                                                                                                            SHA-256:6EDA54D746C092A45395399319DFC878E5674C84FAB8147821524A0042C03F47
                                                                                                                                                                                                                            SHA-512:BFD5ED90D0F16A2F0BCC22B0E847D5781A7B11D6912A51CDC8FCAAD80BF191D821418F7544BF52BF6E1AAA47D06A5442601543E9C25B2352D4E23AFC0C4668F9
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......kT../5../5../5..&M<.#5..}@..-5..}@..=5..}@..%5..}@..,5..;^..$5../5..p5...@..,5...@P..5...@...5..Rich/5..........PE..d.....b.........."......0...H.......4.........@....................................e.....`.................................................4g..........@............v..........8...P]...............................]..8............@...............................text..../.......0.................. ..`.rdata...3...@...4...4..............@..@.data...H............h..............@....pdata...............j..............@..@.rsrc...@............n..............@..@.reloc..8............t..............@..B................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):94856
                                                                                                                                                                                                                            Entropy (8bit):5.499392443352034
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:RmYSYxGfIZnRnD6M7EFOUakPhtUn6KXF4O7Wm1xK/CpcW:QYFZnRDGdvPXU6K1RWmPK/4h
                                                                                                                                                                                                                            MD5:834EE5DA601A6C78C43C64F6C282682F
                                                                                                                                                                                                                            SHA1:03920B402B787CA53CD79A66B0B611C899B91F3E
                                                                                                                                                                                                                            SHA-256:754B61DA108CC9379585E18DDCE90A8092C1B17DA5D922A6E8D6CE84A90B0F87
                                                                                                                                                                                                                            SHA-512:C4A6A49D1EE316FB9EA399487EA17DD813C0A611F473F4FD054D07F6D5C6BB786D40FA478254A499DB3E1D5F0AFDA3B72651EF097945D0C3AA9F0D83D9C0ED06
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........V........-.....;......<.......+....%......S....%......2....~......,.....)...Rich..........PE..d...<..W..........".................Tv..............................................I.....@.......... ..................................................h.......l....D.......p..........................................................X............................text............................... ..`.data...............................@....pdata..l...........................@..@.rsrc...h...........................@..@.reloc..z....p.......B..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):89736
                                                                                                                                                                                                                            Entropy (8bit):5.522767465825831
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:3urhT5+KybRpnE8K74kca7NerB8iXpYmRRXvdi82BSOe9oKSJ2SLD0BEZWkAzrF9:w+KY04RMmSCYmBiF4O7WTn8K/CI
                                                                                                                                                                                                                            MD5:2CC3AC572A2170108BABD019F0BFE779
                                                                                                                                                                                                                            SHA1:AF962245CE32D5801A380FF7F6B8C87AC7772AB2
                                                                                                                                                                                                                            SHA-256:755315DFCC9C72CBE4EB33AF34E9AAC0BD1324C6942F4B56AD9FE0135E1A9299
                                                                                                                                                                                                                            SHA-512:891D545DDF35BF8C650FE8EB48A5E5F6F7C50036E42BE893417AF2EF886EB37C5BEEE9DD838A8F020728E4BAE803F2753CC8F6DD7958DD31B5B39DAED7EF464B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L..."..."..."....."......"......"...#.S."....."..`\..."......"......".Rich..".................PE..L...#.pK.................l..........Td.......................................P......0a....@...... ..........................lm..........p............0.......@...... ...............................0...@............................................text... j.......l.................. ..`.data...4............p..............@....rsrc...p............v..............@..@.reloc.......@.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):93832
                                                                                                                                                                                                                            Entropy (8bit):5.485112927422894
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:fP2K0pa0WfEYp9Y/XQhpgnbP212YCJpDhiF4O7WGkK/CH8:fePOYe4bu1epDh8RWGkK/b
                                                                                                                                                                                                                            MD5:8E7EE7C3876683902475753519681407
                                                                                                                                                                                                                            SHA1:75FACB7F9C59B284F97956E799E57FB0F606C49D
                                                                                                                                                                                                                            SHA-256:6D5041A8EF796C66BA151D8FCFAFDD96BCAA99B57D2777897FD25A87A5E41E13
                                                                                                                                                                                                                            SHA-512:523EBF3A4DF9F6D299E72079DEF0A0DA9127601796D9AA613B70AD2F66EE2166F4F8F75083F47E67FFFD892A09FA437F3B12BD1B27065200E90F8617E3E83727
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X...9...9...9...AF..9...AW..9...A@..9...9..f9...AP.9...AY..9.......9...AG..9...AB..9..Rich.9..........................PE..d.....pK.........."......~...........s.......................................p............@.......... ......................................X}..........p.......T....@.......`......0................................................................................text....|.......~.................. ..`.data...x...........................@....pdata..T...........................@..@.rsrc...p...........................@..@.reloc..p....`.......>..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):323472
                                                                                                                                                                                                                            Entropy (8bit):6.260791393809843
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:xadPqy3/nKyWFZS3PCmxiVvUTiJ+1I2hWHlHTkPXdxs4:wqyAA3PCmwV8i41I2gHlHTkvdW4
                                                                                                                                                                                                                            MD5:128D06B8C5739F35A7C76A76BF1E6149
                                                                                                                                                                                                                            SHA1:901F9698BF4C4A10E8E902E6DBDDF1782E1067D0
                                                                                                                                                                                                                            SHA-256:BF585DBC4E4DCE47F9EFDEEAD15F67A69644CE6F1177CEEC518882DC85ECC096
                                                                                                                                                                                                                            SHA-512:ECE9254486347751D6F68AE86AFB36508FED81B00C4588F555DB584A0E9DE5F4710A24E6BB5B2B19A25BEE20AA4BF90068F9EB2E37B48271614B6C97199E419C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.........................Y...........>w......>w......>w..............<...........u....p.......p.......p......p......Rich............................PE..d...Y.wf.........." ...(.............5....................................... ............`..........................................t......0u..<...............L/..................P...........................(.......@............@..P............................text...0,.......................... ..`.rdata...B...@...D...2..............@..@.data...X6....... ...v..............@....pdata..L/.......0..................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):543632
                                                                                                                                                                                                                            Entropy (8bit):6.3781262731970685
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:zqzF5VH24Jy+0PeZOYbxobw+QY0heC9lVNLETyoK:zqh32SRoc+QY0n9lVNLETbK
                                                                                                                                                                                                                            MD5:94267176E212B8EBFF06728CC6C3F432
                                                                                                                                                                                                                            SHA1:F65313083C2B3177F405B7AB884BA0A9BE3251D9
                                                                                                                                                                                                                            SHA-256:08D08CBFA4D5531CEEE16BFCB2255EDA79C5B7F7C0894C4E6F49F673457AB362
                                                                                                                                                                                                                            SHA-512:014459C9D3DBE7C09E0D6DB085CE9F715248BA6D784845339B2D6896A8BA7B680C93E707D4990350E30C8853A95FD0DC6F8E9244643787DB65AB8A2F95C26967
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W..6..6..6..XF..6..XF...6..XF..6......6......6.......6..XF..6..}J..6..6...6.....6.....6...O.6.....6..Rich.6..........PE..d...~.wf.........." ...(.....4......L.....................................................`.........................................p...........d....p....... ...B...0..........................................(...p...@............0...............................text............................... ..`.rdata.......0......................@..@.data....J.......2..................@....pdata...B... ...D..................@..@.rsrc........p......................@..@.reloc............... ..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):323472
                                                                                                                                                                                                                            Entropy (8bit):6.24323878406639
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:aK/qrBUA8kikYQQ2sXvNnot1bdNtb1lHSdrkjoE:a8qC5kikpQX1ny1bdv1lHSdYjoE
                                                                                                                                                                                                                            MD5:BFEC2012B6589D4496EA0283E90A5269
                                                                                                                                                                                                                            SHA1:813E3FAD5CFE4A30E20F05080D106811C5544FA3
                                                                                                                                                                                                                            SHA-256:F9406ECAA9C86F2946F8B9D997F0210F1F5EE974BE6548D1DB039014D1B45552
                                                                                                                                                                                                                            SHA-512:396F28EB15ED793DB453CD3B3E9118F4386FE24A75E3F3914E881CCA3ADA8918B98751BDAC51C4A5E897CCA1E700B2A545686463A6B0DD6719EA172682CFB928
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`&..$Gt.$Gt.$Gt..7w.!Gt..7q.Gt..7p.4Gt...w..Gt...p.*Gt...q.iGt..7u."Gt..;u.'Gt.$Gu.\Gt.7.q.#Gt.7.t.%Gt.7..%Gt.7.v.%Gt.Rich$Gt.........PE..d...^.wf.........." ...(.*................................................... .......7....`.........................................@x..|....x..d...............P...............................................(.......@............@..x............................text...@).......*.................. ..`.rdata...F...@...H..................@..@.data....6....... ...v..............@....pdata..P........0..................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):99976
                                                                                                                                                                                                                            Entropy (8bit):6.499161413646961
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:yWHL+4KsAzAfadZw+1Hcx8uIYNU5U9H0Q8ecbjt1BHK/CeS:yWr/Z+jPYNV9H0Q8ecbjt1BHK/pS
                                                                                                                                                                                                                            MD5:85054BAF6D0A7D31A18183ACC4CBA133
                                                                                                                                                                                                                            SHA1:24830C002FFAB31102DFB674B52AFFD74E90E708
                                                                                                                                                                                                                            SHA-256:EC86F182F55A338E26F598638F18422E474C6D6C651E1D9955D0303254BF6DDD
                                                                                                                                                                                                                            SHA-512:B6B7D9115ED1D734D7C0EB09E7C7C96EEC29E2C59B8943586976F2182E46B660B99C1947ACF2C1DEB75595771A78B7405FDDBB989A2F06CF88E4AD3D8824055A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d.....`.........." .........`......p................................................>....`A.........................................B..4....J...............p..X....X..............h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):589712
                                                                                                                                                                                                                            Entropy (8bit):6.371606969587959
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:Qnu0YqCbnvh0xDqjFR0NdzhdkPJZIR0vnrXkcc9VNLqYWTF:Qu0YqInZCD7mZI0vnrPc9VNLqYWB
                                                                                                                                                                                                                            MD5:EAB165F7A1856FC4FC191416A26F20F3
                                                                                                                                                                                                                            SHA1:3E3BAAA9A8AE20680D4B347A3A65E4A388DC0F4D
                                                                                                                                                                                                                            SHA-256:A2C87DFE4D43C7CC8AC44F2AC43BD45EC4F3F6BA87A2C73AE8B55F26286600E9
                                                                                                                                                                                                                            SHA-512:897E0F107BEB1FCC6402183C535F2550E954B379451415E8B40403D0575EFA6E1D1373F9F0B9A0649AB09515259490C7BFB9E9926F76735EE513F68460FB5143
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:q..T"..T"..T"..W#..T"..Q#W.T"7MW#..T"7MP#..T"7MQ#..T"..P#..T"..U#..T"5.U#..T"..U"T.T".JQ#..T".JT#..T".J."..T".JV#..T"Rich..T"................PE..d.....wf.........." ...(.....P.......8.......................................@............`..........................................\..x...8]....... ..........tF...........0......@...........................(.......@............................................text............................... ..`.rdata..2...........................@..@.data....C.......,...^..............@....pdata..tF.......H..................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):539536
                                                                                                                                                                                                                            Entropy (8bit):6.374120901700144
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:F2qV/eGvVJVbhqs7MRkPXpaCLz9gS+f/9VNtP8zC:F2q9rVJeMp1Lz9gj/9VNtP8zC
                                                                                                                                                                                                                            MD5:7024D49DF9315B5718F40FCD29A8656F
                                                                                                                                                                                                                            SHA1:EF243D1EC09F2FB714459D596F40A87B5B51C054
                                                                                                                                                                                                                            SHA-256:51877E41297AE94FE33D01D980717AE18938A3E81A32C57ADC77D754EF7E66BE
                                                                                                                                                                                                                            SHA-512:D9B7661B923B45020641F80A4695079A86F92848A022C8374C9339258A3F63D628000628CF75163B7C707A8506BB4D4928A1EA75E09FA6416EB9A2150EB5B705
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k....m...m...m..zn...m..zh._.m..zi...m.?.n...m.?.i...m.?.h...m..zl...m.=vl...m...l.}.m..h...m..m...m.....m..o...m.Rich..m.........................PE..d...`.wf.........." ...(.....&......<........................................p.......N....`.........................................P...p.......P....P..........<B... .......`..\...P...........................(.......@............ ...............................text............................... ..`.rdata..,.... ......................@..@.data....B.......*..................@....pdata..<B.......D..................@..@.rsrc........P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):8184456
                                                                                                                                                                                                                            Entropy (8bit):6.15917051663501
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:98304:AD3K0YyOAYcd0ZLpNu6JmM1W8YcTpOG7ZE78O:ALzUwsFYc9OG7ZE78O
                                                                                                                                                                                                                            MD5:5850A25689FA1B36CD6B76E2E7F6BDB3
                                                                                                                                                                                                                            SHA1:299CEBD4CD448239BF5094DCC0632100287C0B85
                                                                                                                                                                                                                            SHA-256:803870B4FCC1A8C0675EE1D5AA5DEB4132514974CDF0F8F7BA40035377FFDCFA
                                                                                                                                                                                                                            SHA-512:F64A196D0FE937112604D7B0CFE2099928987ECEAA650728C88ECE9BAEF288AF2E4BCDD52D3199D8787290F5071287DAFA5DC6FD44775E52CA1E04237411888F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........].......".......'..........=........@.......................................}...`... ...............................................c.|.... d.t.............|...... c.....................................................`SY.@............................text.....'.......'................. ..`.rdata..PC1...(..D1...'.............@..@.data... ....PY......0Y.............@....idata..|.....c.......\.............@....reloc....... c.......\.............@..B.symtab.......d.......]................B.rsrc...t.... d.......].............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):22184
                                                                                                                                                                                                                            Entropy (8bit):6.685941492131545
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:1hKpVrz0BH8aZqmgBTKDAATaYIYikfF0FP27NBY3Yuv+8N:1hKpVcB15KO7aBYimOK/Y/+g
                                                                                                                                                                                                                            MD5:AAA9DA932D572F5B22CBEE1B4E479ED6
                                                                                                                                                                                                                            SHA1:D708727DED1298610C2E3D72C8792F12FC60CFF2
                                                                                                                                                                                                                            SHA-256:73B55714DB609A1712FD4FC420CE18441E41BB7E3E94D73B11AE28C68CCB1124
                                                                                                                                                                                                                            SHA-512:40A8E2CB18FB2D68F0945B6FBF259FA9331327116A6D21A85AAE6AA12600F7FDD3737B5E84E0AE04C584442016882926D9201E16C25EB937838C8BAC24358779
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0.."...........A... ...`....... ...............................6....`..................................A..O....`..`............,...*...........@..T............................................ ............... ..H............text...."... ...".................. ..`.rsrc...`....`.......$..............@..@.reloc...............*..............@..B.................A......H........'.......................@.......................................(....*..0...............(....o........(....s....*...0............(.......(....s....(....*6r...p..(....*.0.._.......s!.....s....}.....{....r...p.r'..p(....o.........."...s....(....%~....(....,..{....o....s....z*..0..#.......(......-...(....*..3...(....*s....z...(....%~....(....,.r=..p.r'..p(....s....z*..0..#.......(......-..(....&*..3..(....&*s....z..0..7..........~....%-.&~..........s....%.....(.........
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):61608
                                                                                                                                                                                                                            Entropy (8bit):6.287396747644481
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:SmOGveifSTtyXEQ3nPGLb4PFvSMJCD2j+/IfHq1wJd9P581Icm/DskdFPYi3K/Ye:yLTtyXEQ3+bO6U+QlrPi1QLsgFP73K/h
                                                                                                                                                                                                                            MD5:A760AEACBE049C8C0D5DD66DD9EAA7A0
                                                                                                                                                                                                                            SHA1:975896722F2D5A365621EE407ACE3E3294CFC1C3
                                                                                                                                                                                                                            SHA-256:C3618538771839CBC6A855E41A1664D5B86313070FC75CA1B58EF74D007DBDE4
                                                                                                                                                                                                                            SHA-512:64CF42CF493686A4286320819D10A37CC075088509866E867A341651B7762FFD88750417E3AD72E6FA78908DD17C66363752E5AA2955066BA4930889D36AE3CA
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....b..........." ..0.................. ........... ....................... .......L....`.....................................O.......0................*..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...0...........................@..@.reloc..............................@..B........................H.......@@..<...........|.................................................(....*..(....*..(....*.......*Z~....,.*.oB...&......*.......*b~....-.r...ps....z~....*.(#...o8...*.0..........(#......o9.....(....Q*6.(.....(%...*.0..........(#........o:.....(....Q*R.(.......(....('...*:(#......o?...*N.(.....(.....()...*2(#....o;...*2(#....o<...*..o....*..o....*2(#....o=...*2(#....o>...*6(#.....o....*...0..........s"......}"....{"...-...+....#...s.......(1...*6(#.....o....*6..(....(3..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):75432
                                                                                                                                                                                                                            Entropy (8bit):6.020201057914009
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:mjb2NmqeZsE64aEKbMsZG0EN3ovewf8KnWE7LJ/ZEBiUN7TK/P:mjbUmqWL3M/WkV2ZNHK/P
                                                                                                                                                                                                                            MD5:8DC8D595216B1D7703575B77282F7147
                                                                                                                                                                                                                            SHA1:5FBA510AB9D9677B5AF28757BFCFC3E6EE3228F5
                                                                                                                                                                                                                            SHA-256:7A8833790323071279C55854F35A1A802BF5D5766CABCFA381889460F95D5864
                                                                                                                                                                                                                            SHA-512:F1E79E49CF5F10C9BC88D2AAA078FABD772027360A8C9692334AC3BBCDFEEDD93C2C6234F4DE6C6B4AFBD443FD6315633FE8943229EE0CB8CA6A6F29C2AE97EE
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e.Z..........." ..0.............".... ... ....... .......................`......E.....`.....................................O.... ...................*...@..........T............................................ ............... ..H............text...(.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......pG...................... .......................................6.......(....*.~....*F~J......o.......*N........s....o...+*..0............(........~......o2...*.0............(........~K.....o....*.0..%.........(..........(........~L.......o....*....0..H.........(..........(........~M....o.............(....(.........{........o....*2~$....o....*2~#....o....*2~H....oz...*6~I.....o~...*:~J......o....*2~%....o....*2~&....o....*>.(.......o....*...0..N........,........s.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):70824
                                                                                                                                                                                                                            Entropy (8bit):6.236705505937758
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:dMDv5NwVvDK0HBDk4rVHe061i/kObvmaLLJBr+tTB7sK/T:SorK0HBDk4rV21HObvm2LJB4BAK/T
                                                                                                                                                                                                                            MD5:F7543F2749BAB00FB981A41BE19734F8
                                                                                                                                                                                                                            SHA1:8BE0A90C7C011EEF0A775A518F2A29CE4AB035AA
                                                                                                                                                                                                                            SHA-256:634CD208B4FE8DB050AC7D782CB953D51E266B62369F0F80B0CF9D10D077A76F
                                                                                                                                                                                                                            SHA-512:160FBEB4AE704D00800656274B7680003C64559867ACEFB9274A23A1AEE45A145254E66DF423653CC3776A2FFA2A4F98BA93510109CF9963AED4CEBA2913A106
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... F..........." ..0.............J.... ... ....... .......................`............`.....................................O.... ...................*...@......D...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................,.......H.......0<................................................................("...*^.("......I...%...}....*:.(".....}....*b.{....%-.&*..s#...o$...*.0..)........{.........(%...t......|......(...+...3.*....0..)........{.........('...t......|......(...+...3.*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*2.(....s)...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1685
                                                                                                                                                                                                                            Entropy (8bit):4.793020246491965
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:LLVFOGbexvLxcESrKFR8v4rUKtr4DsVZd+LJ0I6YIXjf8bLVFOGblLQM9XIxkKxV:0VNcVrYR8grUOIsX5I6vXapIKKbv
                                                                                                                                                                                                                            MD5:92C0400BF8CDD574F669E40B8D0C2BAB
                                                                                                                                                                                                                            SHA1:3EB5155763A3A204982D4231C7E882DC91F0016F
                                                                                                                                                                                                                            SHA-256:FDC8BFD5790E64F7DE5425BBA4C80A2E8F1648EE037D9A2B61070A8565B12A4A
                                                                                                                                                                                                                            SHA-512:9698839D57A4E3A34BA24CB4BDD6CACF97695748089448AC259CD939D952DF395C82A83E260CF75F8004FE33561E1365CDA1AF1C2DC70F63E28E6EA7403CED0D
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.Uninstalling assembly 'C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe'...Affected parameters are:.. logtoconsole = .. logfile = C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog.. assemblypath = C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe..Removing EventLog source FastestVPNService...Warning: The source FastestVPNService is not registered on the local machine...Service FastestVPNService is being removed from the system.....An exception occurred during the uninstallation of the System.ServiceProcess.ServiceInstaller installer...System.ComponentModel.Win32Exception: The specified service does not exist as an installed service..An exception occurred while uninstalling. This exception will be ignored and the uninstall will continue. However, the application might not be fully uninstalled after the uninstall is complete...Installing assembly 'C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe'...Affected
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7466
                                                                                                                                                                                                                            Entropy (8bit):5.1606801095705865
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:R3DrP/zatgCnNjn1x62muDr9aHmzcv/65m7JDcm0BeUanDtEx6vU4ZPn/R++JDrk:NexdYX7OqWovsx1EvsrJ
                                                                                                                                                                                                                            MD5:FFB29BD88BD23C639985F1D369DBD1CA
                                                                                                                                                                                                                            SHA1:F0AF5F803F59668AD52EA4B212A1CDE00DD5FE14
                                                                                                                                                                                                                            SHA-256:1ADB4F9D1D152E018246A0A2762B473D910906340207F57D3F8CE1097E1DE09F
                                                                                                                                                                                                                            SHA-512:1C12CF185691EE3D44A8522665F6AD20F41A4EE9C5A758B8DD2ABF7CC8F5F863F5CF5CB919BADFCDEE40394A89DA2C9A9601B93FB01B867932FAD4C03932B94D
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?><ArrayOfKeyValueOfanyTypeanyType xmlns:i="http://www.w3.org/2001/XMLSchema-instance" xmlns:x="http://www.w3.org/2001/XMLSchema" z:Id="1" z:Type="System.Collections.Hashtable" z:Assembly="0" xmlns:z="http://schemas.microsoft.com/2003/10/Serialization/" xmlns="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><LoadFactor z:Id="2" z:Type="System.Single" z:Assembly="0" xmlns="">0.72</LoadFactor><Version z:Id="3" z:Type="System.Int32" z:Assembly="0" xmlns="">2</Version><Comparer i:nil="true" xmlns="" /><HashCodeProvider i:nil="true" xmlns="" /><HashSize z:Id="4" z:Type="System.Int32" z:Assembly="0" xmlns="">3</HashSize><Keys z:Id="5" z:Type="System.Object[]" z:Assembly="0" z:Size="2" xmlns=""><anyType z:Id="6" z:Type="System.String" z:Assembly="0" xmlns="http://schemas.microsoft.com/2003/10/Serialization/Arrays">_reserved_nestedSavedStates</anyType><anyType z:Id="7" z:Type="System.String" z:Assembly="0" xmlns="http://schemas.microsoft.com/20
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.588649497011045
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:RYTtf+jLXlZfCd8RzDiFrlwkmGWUlupd0IYisq+i0FP27NBY3Yuv+42r:RYpKjlZfC6Fqg7FYiQ7K/Y/+42r
                                                                                                                                                                                                                            MD5:22D4E4267DFE093E5E23C2F3D7741AA4
                                                                                                                                                                                                                            SHA1:AB18989C4442EB204528E64B18000E8E02FA2C50
                                                                                                                                                                                                                            SHA-256:4E296E9B159F5D64E6E71821C9C06260AC02EBB424823ADA64E97DFD418C3CA1
                                                                                                                                                                                                                            SHA-512:7F6D1228F93E454477E3C4250D1D0C78995DE8D9AE07FA585DC8BDCBB4A1046338B66BEFE0BD9BF63F61085657F7080A1C6350403292E484F047F9ED791EF43B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._S............"...0..............M... ...`....@.. ...............................0....`..................................M..O....`..,............:...*...........L..8............................................ ............... ..H............text....-... ...................... ..`.rsrc...,....`.......0..............@..@.reloc...............8..............@..B.................M......H........(..H#...........L................................................{....*"..}....*6.(.....(....*..0..g.........(....... ....0.. .....0. .....". .....&*. .....#. .....!. ......*(,...*(-...*(....*(/...*(0...*(1...*..0..J.......(....(....-.(....(....&~....r...p(.....(.......1.~......(....(......(....*Z(-....(....%-.&*o....*....0.."........r...p..(....(....(....(......&..*...................0..#....... F#.....+..(....-..*..X...X....2..*..0..1.......(....o......,...-..*..+.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1327
                                                                                                                                                                                                                            Entropy (8bit):5.042117116126737
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:JdArztW1oF7Nv+pvH2/+jSLVhOXrRH2/dVv+BvH2/+jSLVtvH2/39y:3Arzcq7h+Fg+mL27Rgdp+dg+mLPg3w
                                                                                                                                                                                                                            MD5:E40244BE7715300DC4BA229C25237728
                                                                                                                                                                                                                            SHA1:F9D299542C616D860D495CE59A6FD2B90907B2E5
                                                                                                                                                                                                                            SHA-256:AE5027694FF0D363F757F112162AC8D49550826872C9A5B2BA67A75F56109C4D
                                                                                                                                                                                                                            SHA-512:CBEA4111D0A2D8BB5FF5AD631728C85A38668C6D470AB8A4D59D5334B9309EF34125E9A9F70EA942113212D5B1FD5EABF9DF860F9112B52D55C95EE32BB8721A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup> .. <supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.8" />.. </startup>.. <runtime>.. <legacyCorruptedStateExceptionsPolicy enabled="true" />.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.Owin.Security" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.2.2.0" newVersion="4.2.2.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.Owin" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.2.2.0" newVersion="4.2.2.0
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1004
                                                                                                                                                                                                                            Entropy (8bit):4.743456157396208
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:0wL/mMAGQOhPs43XVwL/mMAG8ipNVewL/mMAGbNXpsgOhn:0LTqnVLh6eLY5c
                                                                                                                                                                                                                            MD5:FB8F7A7B8FD8826568D2DEE10D1C9AC1
                                                                                                                                                                                                                            SHA1:D59BBFA7ED11D7044716AD555C4618824133A06C
                                                                                                                                                                                                                            SHA-256:B3C7D69A8763580BB1B0978B8C87FED4E1C8C9934497451D3D813B46B3F8A3F3
                                                                                                                                                                                                                            SHA-512:9DE3C7198F3C42227B9DE16246C189DEF584F51B2A17D210D3ED37346BD7B32989B5CB4F26F548E8FD3C88B166F6FBC1BB3A1DA1A35E83DE417ACC0F4A624485
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.....The uninstall is beginning...See the contents of the log file for the C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe assembly's progress...The file is located at C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog.....The uninstall has completed.....Running a transacted installation.....Beginning the Install phase of the installation...See the contents of the log file for the C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe assembly's progress...The file is located at C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog.....The Install phase completed successfully, and the Commit phase is beginning...See the contents of the log file for the C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe assembly's progress...The file is located at C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.InstallLog.....The Commit phase completed successfully.....The transacted install has complete
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):347016
                                                                                                                                                                                                                            Entropy (8bit):6.2576059322299855
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:+h0+XUaITFNwVI1ZdMfWsaYi3am2Wt6hn7UQjva9v:+u+XUTTvvndMfv64oQu
                                                                                                                                                                                                                            MD5:F4B5415B6C9EC38B073779A034421747
                                                                                                                                                                                                                            SHA1:DADEC8724A898C84A9F52A86A5D0ACFA71758341
                                                                                                                                                                                                                            SHA-256:2672829713F57630F2FC4DA57926456DDA7832F0E0F474F06462D2340B4DC4E3
                                                                                                                                                                                                                            SHA-512:82C58B9061CB8B4603B88AB69CD43461A886029AA7CE1A1ADB614F07EEE90FA979F7CC524272D6A494BADC79254906182DE5A90BF992E48160CA5C3DBE57C334
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U=............" ..0..............<... ...@....... ....................................`.................................z<..O....@...............(...#...`.......;..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......&..............@..B.................<......H.......$....m..............H(...;........................................{0...*..{1...*V.(2.....}0.....}1...*...0..;........u......,/(3....{0....{0...o4...,.(5....{1....{1...o6...*.*. .... )UU.Z(3....{0...o7...X )UU.Z(5....{1...o8...X*.0...........r...p......%..{0....................-.q.............-.&.+.......o9....%..{1....................-.q.............-.&.+.......o9....(:...*..{;...*..{<...*V.(2.....};.....}<...*...0..;........u......,/(3....{;....{;...o4...,.(5....{<..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):24976
                                                                                                                                                                                                                            Entropy (8bit):6.836703429014385
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:STg0otikxUoOHLLEzFzd7h8NTif2+3mJJWg/0W2yHRN7OBu1x85zR9zphght:SwtLUoOrud7hqE2+3mdYuz109zpc
                                                                                                                                                                                                                            MD5:5E8C253B1394C1E6E396A939C9FC9068
                                                                                                                                                                                                                            SHA1:6AE721F34E256FD90A99617BA19040D45FF6A41F
                                                                                                                                                                                                                            SHA-256:4B1A93C57580BD0F304B214EAA3C451272821ACAFC6A0EAE34976606030E0D69
                                                                                                                                                                                                                            SHA-512:22CCA8638EF56059A9DE79289D3EB8289F0774579059C6785B08D08229E366BC8E9FA591EAAFBB4F2952FF7627D1CA0AB180C2B82555BA9C4BC8806F837F478D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l?J..........." ..0..0..........^N... ...`....... ..............................L.....`..................................N..O....`..(............:...'...........@..p............................................ ............... ..H............text...d.... ...0.................. ..`.rsrc...(....`.......2..............@..@.reloc...............8..............@..B................@N......H........&..,....................@.......................................0..T........(.....-.r...ps....z.-.r...ps....z..}......o....%-.&s....}......o....%-.&s....}....*.0..?.........(....}.......}.......}.......}......|......(...+..|....(....*..0..%............(....,...(.....{.....o....o....*....0..I........o....(....-%.....(....,..o ... ....o!.....(....+..o ... ....o!....(...+*v..{......o#...Q.P,..Po$...*.*..0..M........o%.....,B.o&....+%.o'.....o ...o(.....().....(*...o+...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):166800
                                                                                                                                                                                                                            Entropy (8bit):5.092225196099469
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:JtayaXxHE9B92Pqg6/rKvXkZ5QwupmY6jCPL:yqNDKvUZZkVlL
                                                                                                                                                                                                                            MD5:2839920AD2E9C4B08F97715D88586056
                                                                                                                                                                                                                            SHA1:88F7544BF59DDD40E3C934C938A20164F3B518F1
                                                                                                                                                                                                                            SHA-256:A655B1BC143B918C6F31B52AEA2726C131F474B70BF7E2DDF36FE48B1E6E279D
                                                                                                                                                                                                                            SHA-512:E26A141021648398F109B41275154FDFCF139845466C9A37E80A1AD43725D914FD574F59706AD68404555BCB36490CB307E7E0C9158A8B8E94F97CB93E4C0F37
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0..Z...........x... ........... ...............................b....`..................................x..O.......8............d...'...........^..p............................................ ............... ..H............text....X... ...Z.................. ..`.rsrc...8............\..............@..@.reloc...............b..............@..B.................x......H........R..............|S......D^......................................j.-.r...ps$...z.s....(....*..0..Y........-.r...ps$...z.o%...s&......r...p(...+.r+..p..((.....(...+........%...%...%...>....(...+*..-.r...ps$...z......(+.........%...o,...*N.sD...%.oC...(....*b.sD...%.s-...oC...(....*2.sD...(....*....0..C........(.....-.rC..ps$...z.-.rM..ps$...z..,...o......}......}......}....*..0..?.........(/...}4......}5......}6......}3.....|4.....(...+..|4...(1...*j.{....,..{....r]..p.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):101776
                                                                                                                                                                                                                            Entropy (8bit):6.519631245398067
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:+iE88BMo5Gv8yIu8mRfXU5i8Ubd0L1nDmNxk3NUXwPrSMk7+W+shzS0ICpL:+iE88BMo5Gv8yIu8mRfXU5fUbd01mNxV
                                                                                                                                                                                                                            MD5:58D1267BAFC9E0D9531D7C97A08A3A68
                                                                                                                                                                                                                            SHA1:1EC6E26D9E71D1CB5C885879CC8F6D3762DC5FD6
                                                                                                                                                                                                                            SHA-256:34FB96B4CCA40AC4312E36E3310EACC2C13F2562BAAB7FFE836060965B7AD579
                                                                                                                                                                                                                            SHA-512:E6A6EDE57B59CB675D869D1B5BD43C67C864363CE7168538ABB048F911783181546F7CBFEB29EE49EEC21291EEBD442E3BA9819967F8ABE3AD00AC33C94A3620
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c=..........." ..0..\...........z... ........... ...................................`.................................Kz..O....................f...'..........<C..p............................................ ............... ..H............text....Z... ...\.................. ..`.rsrc................^..............@..@.reloc...............d..............@..B.................z......H..........,............A.......B.......................................0..............o+...-..........*......*.0............(...+..-..........*..(...+*....0...........(,....s-...}......}/.....}2........(....r...p.$o/......5...(....r+..p.$o/...}1.....(0...,..o1........(....(2...,....{/...o3...t....}0....{1....(4...-..{0...-..{2...rI..p(....*.0..D........{1....(4...-..{0...-.(5...*.{1....o6...o3....l......(........o6...*.0...........{.......o7...,..*..(....*...0..........s8..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):80784
                                                                                                                                                                                                                            Entropy (8bit):6.644018601476374
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:hwe4Dxq2afEZznigIM8U/w2ZAfiQ922f5qj1NrVuu26zmb:h54DxLaQAOw2C7922i1JVN6b
                                                                                                                                                                                                                            MD5:056A3B1C036A46447EBCA7083DA271A5
                                                                                                                                                                                                                            SHA1:8044FD37E124DF9BAFCE4311DB66D6B931120006
                                                                                                                                                                                                                            SHA-256:6BEDFFF38EB390D01F0D51340B7B4F8F7B3D1C1C6CEE8888C0A8088EDA19283D
                                                                                                                                                                                                                            SHA-512:3399C06120F32219D611D976D778654A2628AC5BA0FA778512FE1101EE461663C5D5819ED5EECF90363F70E69108F5DAA1A3E71E81BB7F9F635AED8908997852
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..............(... ...@....... ..............................M.....`..................................'..O....@..(................'...`..........p............................................ ............... ..H............text........ ...................... ..`.rsrc...(....@......................@..@.reloc.......`......................@..B.................'......H........[..............................................................*....(....**....(....**....(....**....(....*..(&.....%-.&(....}......%-.&...'...s(...}......%-.&s....}....*j...(....%-.&.{......o)...*...0..........s........%-.&~*.......,(...+-....(......-..(,...-....(......-..*..o-...}_....o....(,...,.r...p+..o........{_.....(....}`....{`...-..*.......s/...*...0.............(......-..*.o0.....o1.....(.....(...+o.....+w.o..........o3........(4...,/.(5...(..........%...%.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):65960
                                                                                                                                                                                                                            Entropy (8bit):6.704364809732977
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:qC7HwuzTT2IiiiiHnt7qMkPFb5NMBFv8n+nwfqw9ScubQyvz8:LTT2IiN09yPFbwBFyysqhvQyvo
                                                                                                                                                                                                                            MD5:3B6AD220174768E52510D449C7A5C817
                                                                                                                                                                                                                            SHA1:E76CB664268F45939A0A604E31CAB3DBE957510A
                                                                                                                                                                                                                            SHA-256:294A04A1305277ABDF2539649F8A7909DAC57ECF61F223600227BC1CDED6E2DC
                                                                                                                                                                                                                            SHA-512:43852FA0F4FD12967DAAF81613FF3C52EAD432F39E579E1C5C834595881A9E6AC156BCE326CEE3EB78D11D81AD33792870D31F81D7737483CF36636DB30DFCF1
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ........... .......................@......=.....`.................................e...O....... ................'... ......`...p............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc....... ......................@..B........................H........H...u..............X............................................0..>........-.r...ps....z.o....r...p..o....,..uW.....(....-..*("...s....z..-.r...ps....z.-.r...ps....z.o....r...p.o ...*..(!....s"...(......(......(....*..{....*R..}.....(.....o#...*..{....*"..}....*..{....*"..}....*z.(!.....(......%-.&s$...(....*..{....*"..}....*..{....*"..}....*..(!....-.r...ps....z..(%...s&...}.....{....o'...-.r...ps(...z*....0..g.........,..*.-.r...ps....z.o)...o*..../..*.o)...o+....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):122256
                                                                                                                                                                                                                            Entropy (8bit):6.572766216409801
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:nU40ONP+ki9jNhepTRIvy2V7iOHckTTv0c7tSuagvcCy:ShenI6w7wk0Sq3
                                                                                                                                                                                                                            MD5:C24CF68C9012B4E261D2FD6B2240BBE8
                                                                                                                                                                                                                            SHA1:45844AE139DB45652AAC12E1D6EE138ED709E261
                                                                                                                                                                                                                            SHA-256:42ED395C54526DAD6AA275CA2A65F6DE6E94BC8CEC8548CFB9891BA430FF1974
                                                                                                                                                                                                                            SHA-512:DDF7872EB70E9546D28A209A562C873BA9E9402AD600C3D44ACD425FC7337C19B581A8C06F8BAD5987B36EF82895AAD0DA48CBC7E0E64886CD0EB7C9884FFA4D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....*0..........." ..0.................. ........... ....................... .......$....`.................................k...O........................'..........0}..p............................................ ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........................u.......|........................................-.r...ps(...z......()....o*...*..-.r...ps(...z.-.r...ps(...z.......%...(...+&*..-.r...ps(...z.-.r...ps(...z.......%...(...+*...0..^........-.r...ps(...z.-.r...ps(...z.-.r-..ps(...z.(+...-..rI..p.o,...,.(S...r...ps-...z..s.....(....*...0...........-.r...ps(...z.-.r-..ps(...z..(....,$..(....rI..p.o,...,.(S...r...ps-...zs....%.o............%...(...+..o.......o/..........()...o0...t....o.....*...0..s.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):711952
                                                                                                                                                                                                                            Entropy (8bit):5.967185619483575
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
                                                                                                                                                                                                                            MD5:195FFB7167DB3219B217C4FD439EEDD6
                                                                                                                                                                                                                            SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
                                                                                                                                                                                                                            SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
                                                                                                                                                                                                                            SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):15528
                                                                                                                                                                                                                            Entropy (8bit):6.93175318343703
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:KKE4Nl+ACIYiYF80CX+0tvTS8hFP2bnNr/ZyGMLBVYvmvVKNFUK:ZE4OhIYifS0FP27NBY3Yuv+n
                                                                                                                                                                                                                            MD5:ADF6FCD8199E4DA7F52FBEBD9D9496D7
                                                                                                                                                                                                                            SHA1:17E7E444AB035AE759D3B0E48928B7D23CEC3682
                                                                                                                                                                                                                            SHA-256:C1AF49ACF4E6E9B77C025405CB31E6493F4A9A0080AE48381CE3B36EC5E1D76E
                                                                                                                                                                                                                            SHA-512:72F42DC40B2B1B9C25F0B4BC6E18BCE4B9F144A39442B05E5DF6FB792EA1F5E0645E5CF6251918AF0D81316437982ADBE6892992E4F4323CF48C84A6B08FD809
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....f.P...........!................N)... ...@....... ....................................@..................................(..W....@...................*...`.......'............................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................0)......H........ ......................P ......................................-.N...._J...a.w~.{...I..}.B.;=.XT.Jh.;.(f.eU/@r.. .......g...^......{i....h]..A,};......g..4..bb.....(..S).]..Ol.[..r....C.BSJB............v4.0.30319......l.......#~..d.......#Strings............#US.........#GUID...........#Blob...........G.........%3................................................................H.-...p.i.....i.....................8.....W.......p.....p.................i.......;.$...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):28648
                                                                                                                                                                                                                            Entropy (8bit):6.283743404391549
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:vPYMDLxA6GikwBUGkXkFmDKAsIh5V7L5XWmzWNsWtyHRN7XZj05seyR9zHA:vgMmZ1dUdGZSDuXZj05sN9zg
                                                                                                                                                                                                                            MD5:9FFF1DA4E481028262E27AEFD7C0EFF4
                                                                                                                                                                                                                            SHA1:B0128E42E3CE3C295C48461A651AF99D95B5A04D
                                                                                                                                                                                                                            SHA-256:3FDB918CC5F1E5F1FA9C155DC68AAFE10A16C73ED934C06B201ED94070EA985D
                                                                                                                                                                                                                            SHA-512:6B02B873C4092BFE3C2D8428093696E94C6021DB9D6FA8740E79DF7C6C5208229ED7AE8A62E96597EEEF348956BC6AB79375292B6456162F78D332E3830B75EC
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P^.b.........." ..0..>...........\... ...`....... ..............................c.....`.................................x\..O....`...............H...'..........@[............................................... ............... ..H............text....<... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............F..............@..B.................\......H.......(-...+..........8X.......Z........................................(.....s....(.....s....(.....s....(.....s....(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*..0..1..........j...(.........(...._,.r...p(I...s....z..}....*..{....*"..}....*...0..p.......s....%r...po....&%.(....o....&%r/..po....&%.(....o....&%rU..po....&%.(....o....&%r{..po....&%.(.......(....-.r...p+..(.......(.......( .
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):35496
                                                                                                                                                                                                                            Entropy (8bit):6.3718937380199785
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:PS78zRHlzbzaxUxU7y7y7y7S7CxUxU7y3K7yTyTTN77xNTOLSxY777DKoRREEK7/:PS7DOOqf1RuhC5v7YK/CW1
                                                                                                                                                                                                                            MD5:D438F337397A4CB3CA4E87F70BC4B4C0
                                                                                                                                                                                                                            SHA1:FB6FB592744E34BA9B8B9E2B05F6D9C0C983F353
                                                                                                                                                                                                                            SHA-256:80E40E47F7D6EB2C9CB357B1B3951D0B0429087F44BEC066993C26975CDA4A76
                                                                                                                                                                                                                            SHA-512:8B9E589D378775331C08CEB908C4FC3BCA2AFBEA776E86163E5C641BF1D5F5E84BBA76B6E5C0102EC388005F8D09EAAA80DFB60185C83BF462543A6903236204
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>............." ..0..X...........v... ........... ...............................k....`..................................v..O....................`...*...........v..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................v......H........3...B...........................................................0.................(n...........................s)...}................s%...}................s....}................s....}................s....}................s....} ...............s!...}!...............s....}"...............s....}#...............s=...}$...............s9...}%...............s5...}&...............sA...}'...............sE...}(...............s-...})...............s1...}*........(....(....(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):60584
                                                                                                                                                                                                                            Entropy (8bit):6.426868083769682
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:W0YiwXHy9lkD6vudI9C3dt8dNbm+ESg34o556bYIDwpFGpphsA/FIDbaFLdtlxnn:WxJ8kM9CHJ6bY3zkXX8u4iNd7EgIK/X
                                                                                                                                                                                                                            MD5:D4BECC422A254D1A75CFC60750572848
                                                                                                                                                                                                                            SHA1:2AE1D45045828B8D9A57DD90213F462D72F9A98B
                                                                                                                                                                                                                            SHA-256:A8BC4A168A5F9CD7ABBBBFF3F0794F433233A72D557E168AF42BD34FFF3A2F34
                                                                                                                                                                                                                            SHA-512:91A1E21F87868A00CF715018577A028413CB638A7965756324AFCF16A6108906DCB355959882C2C555C7276EF1A70627E455B4057695DE8C462E4D0679FEFAC5
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.............r.... ........... ....................... ............`................................. ...O........................*..............8............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......T0..4.............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*>.(....o4......*>.(....o4......*>.(....o2......*>.(....o2......*>.(....o2......*v.(....-..(....,..(....+..+..*..{....*"..}....*6..s....}....*..0............(......,...(k.....*....0..4.......s......(....}......}......}......}.....|......(...+*.0..Y.........(....o....r...p(....(c....(f....(g.....(......,&.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):31912
                                                                                                                                                                                                                            Entropy (8bit):6.377780370750934
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:H4sSUSsK/Py54Iu67VMam4AX10KIUt0kYcT/EDYZGSPeyc8cHIlkLi7gIYiNZs0t:HzNK/G4IfVswkYLy5L7pYiNbK/Y/+hM
                                                                                                                                                                                                                            MD5:14515F3569114E0060716ABD3AB3265A
                                                                                                                                                                                                                            SHA1:9E2DBC71979FFB5E3270C9353EA53448D9E07544
                                                                                                                                                                                                                            SHA-256:94DEC461C651A437049E2E5CBA046684E7177C350B836B363880EEEBDD1EBDEA
                                                                                                                                                                                                                            SHA-512:7067B02E1493A61BBABA8DDF922A8B5FDC31466F0E28ADAC116865661E739D6939863C44212FB0A22C49D2F3F03D2C28221E54C15FBC6387C43BD47637A349E4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r.C..........." ..0..J..........~h... ........... ..............................yA....`.................................*h..O....................R...*...........g..8............................................ ............... ..H............text....H... ...J.................. ..`.rsrc................L..............@..@.reloc...............P..............@..B................^h......H........1...5............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*&..(.....*...0...........s.......o.....+X..(.........(....o....o....&..(.........,!..r...po....&...(....o....o....&..r...po....&...(....-...........o ......o....o!.....+...*...........et.......0...........s"...%r...p.o#....%r...pr#..po#....%r+..prA..po#....%r]..p.($...o%...o#....%ro..p.($...o&............o....o'...o#....%r...p.($...o(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):41128
                                                                                                                                                                                                                            Entropy (8bit):6.401085070695131
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:lQq+jQ+JutCjyVmF8Wq8sBP3/7lpKaDBuz3bzrzlJBOKipq8pdwYv4qzsYiCtRKS:4VutFQF873t3/77KaDBuz3bzrBJBOKiT
                                                                                                                                                                                                                            MD5:AD53B27150F1E38EF23BD155A07E2313
                                                                                                                                                                                                                            SHA1:3A9A4383B9286A0E1A3F4102BC56437A5A961E41
                                                                                                                                                                                                                            SHA-256:62DBC8A6D43D623E5F267B59A3C78807CB08EFBE37A06A67425C9458D8B985DA
                                                                                                                                                                                                                            SHA-512:F8D471175E39425F1E1613C60EDD9D1A98DBACC98E3F18746AA642524AFB7D9F9A299B2BE33629200AB94538BF95C78B6343DE193EE3AD48B1CFC1DD4E37E9D4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z:..........." ..0..n..........&.... ........... ....................................`....................................O.......h............v...*..........@...8............................................ ............... ..H............text...,m... ...n.................. ..`.rsrc...h............p..............@..@.reloc...............t..............@..B........................H........6..PU............................................................{....*"..}....*..{....*"..}....*..~....}......s....}.....(........(.............s*...}....*....0..................,5...(A.....(.........,..~.....(.....s....o.......8..............0....B+......8..... . ...G+.. . ..;....8....~.....(.....s....o.....8....~.....(.....s....o.....+s.o.....~.....(....s....o......(....o ...r...p(!.......,...(.......{.....{....o"....(6...&+...(......s#...(.....+.+..*..0..F.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):20136
                                                                                                                                                                                                                            Entropy (8bit):6.721932799011409
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:WaXxdsvBO/dITrZ+VK6G6IYi+PVC0FP27NBY3Yuv+cN:WJZl6GHYiGZK/Y/+cN
                                                                                                                                                                                                                            MD5:8E6A799F0DA3FBA278F06D4C7A18E7B5
                                                                                                                                                                                                                            SHA1:B9AD516A47362FFAF360C1E8794D2F10C8E7080F
                                                                                                                                                                                                                            SHA-256:1029DDF44F3CD774754DDFEAFB97BE18CD31B50DE24F19870F9BDE8163B5DEA5
                                                                                                                                                                                                                            SHA-512:4607E418C0BE1F632CBE5CE0A8F1877F45EB873C193B4FF7C52495E891BD05D7F3AA3847D97F36D7B5601FCCAFCF6DE4A822140D9610C9E9BCA900BC06C67DE8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W/%..........." ..0.............^;... ...@....... ....................................`..................................;..O....@...............$...*...`......l:..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B................>;......H........$..............................................................F.(....r...p(....*..{....*"..}....*..0...........s......r...po....&.r-..p.(....o....(....o....&.rI..p.(....o....r_..p(....o....&.rg..p.(....o....(....o....&.(......,...ru..po....&..r...po....&.r...po....&.r...p.(....o....(....o....&.r...po....&.r...p.(....o....r...p(....o....&.(....o.....o....( ....*..r...p.(....o!...r...p(....r...p.(....o....r...p(....("...&*..r?..prK..p.(.........(#...("...&*..r?..pr...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):18088
                                                                                                                                                                                                                            Entropy (8bit):6.788270069437216
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:CiqjQN+Pw2X6VUYNVYuKAiIYiUOI0FP27NBY3Yuv+Pg:1qjQ8f5uKAvYidpK/Y/+4
                                                                                                                                                                                                                            MD5:A891AAC2D9FD1B939E07BE155AFC84FF
                                                                                                                                                                                                                            SHA1:7F977350D9CFD10C259356D98C0606779519C6EF
                                                                                                                                                                                                                            SHA-256:38D6709A0A003761850933F79132CCDC40B6F26460169BAB092931BBA1500683
                                                                                                                                                                                                                            SHA-512:E4227CA484824ED3C912A58B741B4A447ACC50DFFB9945165303D5362BA39217FFAEFC62DF60D292A8B081DAD82CD85593FF64DB93DBC26465355D89AA527724
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X4y..........." ..0.............n3... ...@....... ...................................`..................................3..O....@..H................*...`.......2..8............................................ ............... ..H............text...t.... ...................... ..`.rsrc...H....@......................@..@.reloc.......`......................@..B................N3......H........#................................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..(........%-.&r...ps....z(.......(.....*.0..................,..rM..ps....z.(.........,...(....o.......(.......(.....s....o.........(....(......(....o......(....o........&..(.....r...ps....o........*..........tu.......0..B..........(....%-.&+.o.......*&..(.....(....%-.&.+.(......s....o........*.............*.....0..B..........(....%-.&+.o ......*&..(.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.829205499580206
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:+NjMaZomdl7FUC9mhsCVoNycrjIg9J197j26dIYi5YFK0FP27NBY3Yuv+QgP:+HhShzuD/Bpa6KYiyFjK/Y/+PP
                                                                                                                                                                                                                            MD5:76DC589253A2FDAAA3CDD02E9F5421DD
                                                                                                                                                                                                                            SHA1:A072B9CDDBDC150394643EBFD565A2443AFD9501
                                                                                                                                                                                                                            SHA-256:9AC1C9B0343F4D9638FEB4FA25824AFBD2D829EEBF13E54A5FD2197CED2118B5
                                                                                                                                                                                                                            SHA-512:50A85E3C61A2506912BC0F4547079DAB2C6B60A882127A4C3087C9AB4065C6568B1E8D4AF246D68BFEE7E7347664883A2FC8E00E2E58EA1DE867FE33D8220861
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.a.pi.Hpi.Hpi.H68.Hri.H68.H|i.H68.Hri.H68.Hti.H...Hqi.H...Hyi.Hpi.HFi.H};.Hsi.H};.Hqi.H};.Hqi.H};.Hqi.HRichpi.H........PE..L....q.Z...........!.................$.......0...............................p.......D....@..........................7......D:.......P...............:...*...`..x...................................p4..@............0...............................text............................... ..`.rdata.......0......."..............@..@.data...\....@.......2..............@....rsrc........P.......4..............@..@.reloc..x....`.......6..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):116872
                                                                                                                                                                                                                            Entropy (8bit):6.726218253535254
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:8tw0r3S8FpUCSBCLiXdb0NphY3kWlon6ZhPn8agN6K/p:8mWi8FpCBCLybQakA/Pn8agNj/p
                                                                                                                                                                                                                            MD5:B9F4D43230B7FB66B95AF05DC03B32DE
                                                                                                                                                                                                                            SHA1:56F868C56FFF836CA61055499988F965DCA37D26
                                                                                                                                                                                                                            SHA-256:A103634B16841E3A68DD4A6BCBDFC3A1651B8C9F1114D99BF01CA31297664E21
                                                                                                                                                                                                                            SHA-512:50EB5DE7D0A1B5D7E1AC38209488635EF77733C2C78DC39D0D473904128DBFC67D4E3EC388D2C2D79645AFDF03FD1965386F6E6D21553C9A6DAB07A58549FD1E
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V.n.7.=.7.=.7.=.S.<.7.=.S.<o7.=.S.<.7.=._.<.7.=._.<.7.=._.<.7.=.S.<.7.=.7.=.7.=._.<.7.=._.<.7.=._3=.7.=._.<.7.=Rich.7.=........................PE..L...q._]...........!................O........0............................................@.............................T.......<.......................................p...............................@............0...............................text............................... ..`.rdata..4g...0...h..................@..@.data...4...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):20136
                                                                                                                                                                                                                            Entropy (8bit):6.721932799011409
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:WaXxdsvBO/dITrZ+VK6G6IYi+PVC0FP27NBY3Yuv+cN:WJZl6GHYiGZK/Y/+cN
                                                                                                                                                                                                                            MD5:8E6A799F0DA3FBA278F06D4C7A18E7B5
                                                                                                                                                                                                                            SHA1:B9AD516A47362FFAF360C1E8794D2F10C8E7080F
                                                                                                                                                                                                                            SHA-256:1029DDF44F3CD774754DDFEAFB97BE18CD31B50DE24F19870F9BDE8163B5DEA5
                                                                                                                                                                                                                            SHA-512:4607E418C0BE1F632CBE5CE0A8F1877F45EB873C193B4FF7C52495E891BD05D7F3AA3847D97F36D7B5601FCCAFCF6DE4A822140D9610C9E9BCA900BC06C67DE8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W/%..........." ..0.............^;... ...@....... ....................................`..................................;..O....@...............$...*...`......l:..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B................>;......H........$..............................................................F.(....r...p(....*..{....*"..}....*..0...........s......r...po....&.r-..p.(....o....(....o....&.rI..p.(....o....r_..p(....o....&.rg..p.(....o....(....o....&.(......,...ru..po....&..r...po....&.r...po....&.r...p.(....o....(....o....&.r...po....&.r...p.(....o....r...p(....o....&.(....o.....o....( ....*..r...p.(....o!...r...p(....r...p.(....o....r...p(....("...&*..r?..prK..p.(.........(#...("...&*..r?..pr...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):35496
                                                                                                                                                                                                                            Entropy (8bit):6.3718937380199785
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:PS78zRHlzbzaxUxU7y7y7y7S7CxUxU7y3K7yTyTTN77xNTOLSxY777DKoRREEK7/:PS7DOOqf1RuhC5v7YK/CW1
                                                                                                                                                                                                                            MD5:D438F337397A4CB3CA4E87F70BC4B4C0
                                                                                                                                                                                                                            SHA1:FB6FB592744E34BA9B8B9E2B05F6D9C0C983F353
                                                                                                                                                                                                                            SHA-256:80E40E47F7D6EB2C9CB357B1B3951D0B0429087F44BEC066993C26975CDA4A76
                                                                                                                                                                                                                            SHA-512:8B9E589D378775331C08CEB908C4FC3BCA2AFBEA776E86163E5C641BF1D5F5E84BBA76B6E5C0102EC388005F8D09EAAA80DFB60185C83BF462543A6903236204
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>............." ..0..X...........v... ........... ...............................k....`..................................v..O....................`...*...........v..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................v......H........3...B...........................................................0.................(n...........................s)...}................s%...}................s....}................s....}................s....}................s....} ...............s!...}!...............s....}"...............s....}#...............s=...}$...............s9...}%...............s5...}&...............sA...}'...............sE...}(...............s-...})...............s1...}*........(....(....(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):116872
                                                                                                                                                                                                                            Entropy (8bit):6.726218253535254
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:8tw0r3S8FpUCSBCLiXdb0NphY3kWlon6ZhPn8agN6K/p:8mWi8FpCBCLybQakA/Pn8agNj/p
                                                                                                                                                                                                                            MD5:B9F4D43230B7FB66B95AF05DC03B32DE
                                                                                                                                                                                                                            SHA1:56F868C56FFF836CA61055499988F965DCA37D26
                                                                                                                                                                                                                            SHA-256:A103634B16841E3A68DD4A6BCBDFC3A1651B8C9F1114D99BF01CA31297664E21
                                                                                                                                                                                                                            SHA-512:50EB5DE7D0A1B5D7E1AC38209488635EF77733C2C78DC39D0D473904128DBFC67D4E3EC388D2C2D79645AFDF03FD1965386F6E6D21553C9A6DAB07A58549FD1E
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V.n.7.=.7.=.7.=.S.<.7.=.S.<o7.=.S.<.7.=._.<.7.=._.<.7.=._.<.7.=.S.<.7.=.7.=.7.=._.<.7.=._.<.7.=._3=.7.=._.<.7.=Rich.7.=........................PE..L...q._]...........!................O........0............................................@.............................T.......<.......................................p...............................@............0...............................text............................... ..`.rdata..4g...0...h..................@..@.data...4...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):65960
                                                                                                                                                                                                                            Entropy (8bit):6.704364809732977
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:qC7HwuzTT2IiiiiHnt7qMkPFb5NMBFv8n+nwfqw9ScubQyvz8:LTT2IiN09yPFbwBFyysqhvQyvo
                                                                                                                                                                                                                            MD5:3B6AD220174768E52510D449C7A5C817
                                                                                                                                                                                                                            SHA1:E76CB664268F45939A0A604E31CAB3DBE957510A
                                                                                                                                                                                                                            SHA-256:294A04A1305277ABDF2539649F8A7909DAC57ECF61F223600227BC1CDED6E2DC
                                                                                                                                                                                                                            SHA-512:43852FA0F4FD12967DAAF81613FF3C52EAD432F39E579E1C5C834595881A9E6AC156BCE326CEE3EB78D11D81AD33792870D31F81D7737483CF36636DB30DFCF1
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ........... .......................@......=.....`.................................e...O....... ................'... ......`...p............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc....... ......................@..B........................H........H...u..............X............................................0..>........-.r...ps....z.o....r...p..o....,..uW.....(....-..*("...s....z..-.r...ps....z.-.r...ps....z.o....r...p.o ...*..(!....s"...(......(......(....*..{....*R..}.....(.....o#...*..{....*"..}....*..{....*"..}....*z.(!.....(......%-.&s$...(....*..{....*"..}....*..{....*"..}....*..(!....-.r...ps....z..(%...s&...}.....{....o'...-.r...ps(...z*....0..g.........,..*.-.r...ps....z.o)...o*..../..*.o)...o+....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):159368
                                                                                                                                                                                                                            Entropy (8bit):6.32384599449582
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:OcqXDYZbIkCKezJaoCNVljUmcmAs6Jm4AFt2iPaTatnhrOKK/E:9qbKwcB4njeXBSTcpOT/E
                                                                                                                                                                                                                            MD5:7AE17C855F3CC63174E90EA527B6138B
                                                                                                                                                                                                                            SHA1:0FE1E1B2252511F33EDA3FFCF1F8FC8586AB040A
                                                                                                                                                                                                                            SHA-256:26FF04208EC4D26EF4DDD9B3CF01C4D2A1544550BCD59EFDE6F30170053A1170
                                                                                                                                                                                                                            SHA-512:453BA41332A704F491FC9E1EE5FBE9F883EDDB4C26A71D207C93992726E9C5B7FEDC48EEEE2A2087F64B083F9473EE794FB2C8F3B77C9DBCBBC47B67816BD156
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..............Y.......................................................................Rich....................PE..L.....[...........!.........................................................`..................................................P.... ..`............@.......0..(...0...............................0...@............................................text....w.......................... ..`.rdata...A.......P..................@..@.data....6....... ..................@....rsrc...`.... ......................@..@.reloc..2(...0...0..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):347016
                                                                                                                                                                                                                            Entropy (8bit):6.2576059322299855
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:+h0+XUaITFNwVI1ZdMfWsaYi3am2Wt6hn7UQjva9v:+u+XUTTvvndMfv64oQu
                                                                                                                                                                                                                            MD5:F4B5415B6C9EC38B073779A034421747
                                                                                                                                                                                                                            SHA1:DADEC8724A898C84A9F52A86A5D0ACFA71758341
                                                                                                                                                                                                                            SHA-256:2672829713F57630F2FC4DA57926456DDA7832F0E0F474F06462D2340B4DC4E3
                                                                                                                                                                                                                            SHA-512:82C58B9061CB8B4603B88AB69CD43461A886029AA7CE1A1ADB614F07EEE90FA979F7CC524272D6A494BADC79254906182DE5A90BF992E48160CA5C3DBE57C334
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U=............" ..0..............<... ...@....... ....................................`.................................z<..O....@...............(...#...`.......;..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......&..............@..B.................<......H.......$....m..............H(...;........................................{0...*..{1...*V.(2.....}0.....}1...*...0..;........u......,/(3....{0....{0...o4...,.(5....{1....{1...o6...*.*. .... )UU.Z(3....{0...o7...X )UU.Z(5....{1...o8...X*.0...........r...p......%..{0....................-.q.............-.&.+.......o9....%..{1....................-.q.............-.&.+.......o9....(:...*..{;...*..{<...*V.(2.....};.....}<...*...0..;........u......,/(3....{;....{;...o4...,.(5....{<..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1327
                                                                                                                                                                                                                            Entropy (8bit):5.042117116126737
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:JdArztW1oF7Nv+pvH2/+jSLVhOXrRH2/dVv+BvH2/+jSLVtvH2/39y:3Arzcq7h+Fg+mL27Rgdp+dg+mLPg3w
                                                                                                                                                                                                                            MD5:E40244BE7715300DC4BA229C25237728
                                                                                                                                                                                                                            SHA1:F9D299542C616D860D495CE59A6FD2B90907B2E5
                                                                                                                                                                                                                            SHA-256:AE5027694FF0D363F757F112162AC8D49550826872C9A5B2BA67A75F56109C4D
                                                                                                                                                                                                                            SHA-512:CBEA4111D0A2D8BB5FF5AD631728C85A38668C6D470AB8A4D59D5334B9309EF34125E9A9F70EA942113212D5B1FD5EABF9DF860F9112B52D55C95EE32BB8721A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup> .. <supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.8" />.. </startup>.. <runtime>.. <legacyCorruptedStateExceptionsPolicy enabled="true" />.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.Owin.Security" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.2.2.0" newVersion="4.2.2.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.Owin" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.2.2.0" newVersion="4.2.2.0
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):24976
                                                                                                                                                                                                                            Entropy (8bit):6.836703429014385
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:STg0otikxUoOHLLEzFzd7h8NTif2+3mJJWg/0W2yHRN7OBu1x85zR9zphght:SwtLUoOrud7hqE2+3mdYuz109zpc
                                                                                                                                                                                                                            MD5:5E8C253B1394C1E6E396A939C9FC9068
                                                                                                                                                                                                                            SHA1:6AE721F34E256FD90A99617BA19040D45FF6A41F
                                                                                                                                                                                                                            SHA-256:4B1A93C57580BD0F304B214EAA3C451272821ACAFC6A0EAE34976606030E0D69
                                                                                                                                                                                                                            SHA-512:22CCA8638EF56059A9DE79289D3EB8289F0774579059C6785B08D08229E366BC8E9FA591EAAFBB4F2952FF7627D1CA0AB180C2B82555BA9C4BC8806F837F478D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l?J..........." ..0..0..........^N... ...`....... ..............................L.....`..................................N..O....`..(............:...'...........@..p............................................ ............... ..H............text...d.... ...0.................. ..`.rsrc...(....`.......2..............@..@.reloc...............8..............@..B................@N......H........&..,....................@.......................................0..T........(.....-.r...ps....z.-.r...ps....z..}......o....%-.&s....}......o....%-.&s....}....*.0..?.........(....}.......}.......}.......}......|......(...+..|....(....*..0..%............(....,...(.....{.....o....o....*....0..I........o....(....-%.....(....,..o ... ....o!.....(....+..o ... ....o!....(...+*v..{......o#...Q.P,..Po$...*.*..0..M........o%.....,B.o&....+%.o'.....o ...o(.....().....(*...o+...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):31912
                                                                                                                                                                                                                            Entropy (8bit):6.377780370750934
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:H4sSUSsK/Py54Iu67VMam4AX10KIUt0kYcT/EDYZGSPeyc8cHIlkLi7gIYiNZs0t:HzNK/G4IfVswkYLy5L7pYiNbK/Y/+hM
                                                                                                                                                                                                                            MD5:14515F3569114E0060716ABD3AB3265A
                                                                                                                                                                                                                            SHA1:9E2DBC71979FFB5E3270C9353EA53448D9E07544
                                                                                                                                                                                                                            SHA-256:94DEC461C651A437049E2E5CBA046684E7177C350B836B363880EEEBDD1EBDEA
                                                                                                                                                                                                                            SHA-512:7067B02E1493A61BBABA8DDF922A8B5FDC31466F0E28ADAC116865661E739D6939863C44212FB0A22C49D2F3F03D2C28221E54C15FBC6387C43BD47637A349E4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r.C..........." ..0..J..........~h... ........... ..............................yA....`.................................*h..O....................R...*...........g..8............................................ ............... ..H............text....H... ...J.................. ..`.rsrc................L..............@..@.reloc...............P..............@..B................^h......H........1...5............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*&..(.....*...0...........s.......o.....+X..(.........(....o....o....&..(.........,!..r...po....&...(....o....o....&..r...po....&...(....-...........o ......o....o!.....+...*...........et.......0...........s"...%r...p.o#....%r...pr#..po#....%r+..prA..po#....%r]..p.($...o%...o#....%ro..p.($...o&............o....o'...o#....%r...p.($...o(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):101776
                                                                                                                                                                                                                            Entropy (8bit):6.519631245398067
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:+iE88BMo5Gv8yIu8mRfXU5i8Ubd0L1nDmNxk3NUXwPrSMk7+W+shzS0ICpL:+iE88BMo5Gv8yIu8mRfXU5fUbd01mNxV
                                                                                                                                                                                                                            MD5:58D1267BAFC9E0D9531D7C97A08A3A68
                                                                                                                                                                                                                            SHA1:1EC6E26D9E71D1CB5C885879CC8F6D3762DC5FD6
                                                                                                                                                                                                                            SHA-256:34FB96B4CCA40AC4312E36E3310EACC2C13F2562BAAB7FFE836060965B7AD579
                                                                                                                                                                                                                            SHA-512:E6A6EDE57B59CB675D869D1B5BD43C67C864363CE7168538ABB048F911783181546F7CBFEB29EE49EEC21291EEBD442E3BA9819967F8ABE3AD00AC33C94A3620
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c=..........." ..0..\...........z... ........... ...................................`.................................Kz..O....................f...'..........<C..p............................................ ............... ..H............text....Z... ...\.................. ..`.rsrc................^..............@..@.reloc...............d..............@..B.................z......H..........,............A.......B.......................................0..............o+...-..........*......*.0............(...+..-..........*..(...+*....0...........(,....s-...}......}/.....}2........(....r...p.$o/......5...(....r+..p.$o/...}1.....(0...,..o1........(....(2...,....{/...o3...t....}0....{1....(4...-..{0...-..{2...rI..p(....*.0..D........{1....(4...-..{0...-.(5...*.{1....o6...o3....l......(........o6...*.0...........{.......o7...,..*..(....*...0..........s8..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):28648
                                                                                                                                                                                                                            Entropy (8bit):6.283743404391549
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:vPYMDLxA6GikwBUGkXkFmDKAsIh5V7L5XWmzWNsWtyHRN7XZj05seyR9zHA:vgMmZ1dUdGZSDuXZj05sN9zg
                                                                                                                                                                                                                            MD5:9FFF1DA4E481028262E27AEFD7C0EFF4
                                                                                                                                                                                                                            SHA1:B0128E42E3CE3C295C48461A651AF99D95B5A04D
                                                                                                                                                                                                                            SHA-256:3FDB918CC5F1E5F1FA9C155DC68AAFE10A16C73ED934C06B201ED94070EA985D
                                                                                                                                                                                                                            SHA-512:6B02B873C4092BFE3C2D8428093696E94C6021DB9D6FA8740E79DF7C6C5208229ED7AE8A62E96597EEEF348956BC6AB79375292B6456162F78D332E3830B75EC
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P^.b.........." ..0..>...........\... ...`....... ..............................c.....`.................................x\..O....`...............H...'..........@[............................................... ............... ..H............text....<... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............F..............@..B.................\......H.......(-...+..........8X.......Z........................................(.....s....(.....s....(.....s....(.....s....(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*..0..1..........j...(.........(...._,.r...p(I...s....z..}....*..{....*"..}....*...0..p.......s....%r...po....&%.(....o....&%r/..po....&%.(....o....&%rU..po....&%.(....o....&%r{..po....&%.(.......(....-.r...p+..(.......(.......( .
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):18088
                                                                                                                                                                                                                            Entropy (8bit):6.788270069437216
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:CiqjQN+Pw2X6VUYNVYuKAiIYiUOI0FP27NBY3Yuv+Pg:1qjQ8f5uKAvYidpK/Y/+4
                                                                                                                                                                                                                            MD5:A891AAC2D9FD1B939E07BE155AFC84FF
                                                                                                                                                                                                                            SHA1:7F977350D9CFD10C259356D98C0606779519C6EF
                                                                                                                                                                                                                            SHA-256:38D6709A0A003761850933F79132CCDC40B6F26460169BAB092931BBA1500683
                                                                                                                                                                                                                            SHA-512:E4227CA484824ED3C912A58B741B4A447ACC50DFFB9945165303D5362BA39217FFAEFC62DF60D292A8B081DAD82CD85593FF64DB93DBC26465355D89AA527724
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X4y..........." ..0.............n3... ...@....... ...................................`..................................3..O....@..H................*...`.......2..8............................................ ............... ..H............text...t.... ...................... ..`.rsrc...H....@......................@..@.reloc.......`......................@..B................N3......H........#................................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..(........%-.&r...ps....z(.......(.....*.0..................,..rM..ps....z.(.........,...(....o.......(.......(.....s....o.........(....(......(....o......(....o........&..(.....r...ps....o........*..........tu.......0..B..........(....%-.&+.o.......*&..(.....(....%-.&.+.(......s....o........*.............*.....0..B..........(....%-.&+.o ......*&..(.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):80784
                                                                                                                                                                                                                            Entropy (8bit):6.644018601476374
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:hwe4Dxq2afEZznigIM8U/w2ZAfiQ922f5qj1NrVuu26zmb:h54DxLaQAOw2C7922i1JVN6b
                                                                                                                                                                                                                            MD5:056A3B1C036A46447EBCA7083DA271A5
                                                                                                                                                                                                                            SHA1:8044FD37E124DF9BAFCE4311DB66D6B931120006
                                                                                                                                                                                                                            SHA-256:6BEDFFF38EB390D01F0D51340B7B4F8F7B3D1C1C6CEE8888C0A8088EDA19283D
                                                                                                                                                                                                                            SHA-512:3399C06120F32219D611D976D778654A2628AC5BA0FA778512FE1101EE461663C5D5819ED5EECF90363F70E69108F5DAA1A3E71E81BB7F9F635AED8908997852
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..............(... ...@....... ..............................M.....`..................................'..O....@..(................'...`..........p............................................ ............... ..H............text........ ...................... ..`.rsrc...(....@......................@..@.reloc.......`......................@..B.................'......H........[..............................................................*....(....**....(....**....(....**....(....*..(&.....%-.&(....}......%-.&...'...s(...}......%-.&s....}....*j...(....%-.&.{......o)...*...0..........s........%-.&~*.......,(...+-....(......-..(,...-....(......-..*..o-...}_....o....(,...,.r...p+..o........{_.....(....}`....{`...-..*.......s/...*...0.............(......-..*.o0.....o1.....(.....(...+o.....+w.o..........o3........(4...,/.(5...(..........%...%.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):122256
                                                                                                                                                                                                                            Entropy (8bit):6.572766216409801
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:nU40ONP+ki9jNhepTRIvy2V7iOHckTTv0c7tSuagvcCy:ShenI6w7wk0Sq3
                                                                                                                                                                                                                            MD5:C24CF68C9012B4E261D2FD6B2240BBE8
                                                                                                                                                                                                                            SHA1:45844AE139DB45652AAC12E1D6EE138ED709E261
                                                                                                                                                                                                                            SHA-256:42ED395C54526DAD6AA275CA2A65F6DE6E94BC8CEC8548CFB9891BA430FF1974
                                                                                                                                                                                                                            SHA-512:DDF7872EB70E9546D28A209A562C873BA9E9402AD600C3D44ACD425FC7337C19B581A8C06F8BAD5987B36EF82895AAD0DA48CBC7E0E64886CD0EB7C9884FFA4D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....*0..........." ..0.................. ........... ....................... .......$....`.................................k...O........................'..........0}..p............................................ ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........................u.......|........................................-.r...ps(...z......()....o*...*..-.r...ps(...z.-.r...ps(...z.......%...(...+&*..-.r...ps(...z.-.r...ps(...z.......%...(...+*...0..^........-.r...ps(...z.-.r...ps(...z.-.r-..ps(...z.(+...-..rI..p.o,...,.(S...r...ps-...z..s.....(....*...0...........-.r...ps(...z.-.r-..ps(...z..(....,$..(....rI..p.o,...,.(S...r...ps-...zs....%.o............%...(...+..o.......o/..........()...o0...t....o.....*...0..s.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):70824
                                                                                                                                                                                                                            Entropy (8bit):6.236705505937758
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:dMDv5NwVvDK0HBDk4rVHe061i/kObvmaLLJBr+tTB7sK/T:SorK0HBDk4rV21HObvm2LJB4BAK/T
                                                                                                                                                                                                                            MD5:F7543F2749BAB00FB981A41BE19734F8
                                                                                                                                                                                                                            SHA1:8BE0A90C7C011EEF0A775A518F2A29CE4AB035AA
                                                                                                                                                                                                                            SHA-256:634CD208B4FE8DB050AC7D782CB953D51E266B62369F0F80B0CF9D10D077A76F
                                                                                                                                                                                                                            SHA-512:160FBEB4AE704D00800656274B7680003C64559867ACEFB9274A23A1AEE45A145254E66DF423653CC3776A2FFA2A4F98BA93510109CF9963AED4CEBA2913A106
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... F..........." ..0.............J.... ... ....... .......................`............`.....................................O.... ...................*...@......D...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................,.......H.......0<................................................................("...*^.("......I...%...}....*:.(".....}....*b.{....%-.&*..s#...o$...*.0..)........{.........(%...t......|......(...+...3.*....0..)........{.........('...t......|......(...+...3.*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*2.(....s)...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):711952
                                                                                                                                                                                                                            Entropy (8bit):5.967185619483575
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
                                                                                                                                                                                                                            MD5:195FFB7167DB3219B217C4FD439EEDD6
                                                                                                                                                                                                                            SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
                                                                                                                                                                                                                            SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
                                                                                                                                                                                                                            SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):41128
                                                                                                                                                                                                                            Entropy (8bit):6.401085070695131
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:lQq+jQ+JutCjyVmF8Wq8sBP3/7lpKaDBuz3bzrzlJBOKipq8pdwYv4qzsYiCtRKS:4VutFQF873t3/77KaDBuz3bzrBJBOKiT
                                                                                                                                                                                                                            MD5:AD53B27150F1E38EF23BD155A07E2313
                                                                                                                                                                                                                            SHA1:3A9A4383B9286A0E1A3F4102BC56437A5A961E41
                                                                                                                                                                                                                            SHA-256:62DBC8A6D43D623E5F267B59A3C78807CB08EFBE37A06A67425C9458D8B985DA
                                                                                                                                                                                                                            SHA-512:F8D471175E39425F1E1613C60EDD9D1A98DBACC98E3F18746AA642524AFB7D9F9A299B2BE33629200AB94538BF95C78B6343DE193EE3AD48B1CFC1DD4E37E9D4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z:..........." ..0..n..........&.... ........... ....................................`....................................O.......h............v...*..........@...8............................................ ............... ..H............text...,m... ...n.................. ..`.rsrc...h............p..............@..@.reloc...............t..............@..B........................H........6..PU............................................................{....*"..}....*..{....*"..}....*..~....}......s....}.....(........(.............s*...}....*....0..................,5...(A.....(.........,..~.....(.....s....o.......8..............0....B+......8..... . ...G+.. . ..;....8....~.....(.....s....o.....8....~.....(.....s....o.....+s.o.....~.....(....s....o......(....o ...r...p(!.......,...(.......{.....{....o"....(6...&+...(......s#...(.....+.+..*..0..F.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):60584
                                                                                                                                                                                                                            Entropy (8bit):6.426868083769682
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:W0YiwXHy9lkD6vudI9C3dt8dNbm+ESg34o556bYIDwpFGpphsA/FIDbaFLdtlxnn:WxJ8kM9CHJ6bY3zkXX8u4iNd7EgIK/X
                                                                                                                                                                                                                            MD5:D4BECC422A254D1A75CFC60750572848
                                                                                                                                                                                                                            SHA1:2AE1D45045828B8D9A57DD90213F462D72F9A98B
                                                                                                                                                                                                                            SHA-256:A8BC4A168A5F9CD7ABBBBFF3F0794F433233A72D557E168AF42BD34FFF3A2F34
                                                                                                                                                                                                                            SHA-512:91A1E21F87868A00CF715018577A028413CB638A7965756324AFCF16A6108906DCB355959882C2C555C7276EF1A70627E455B4057695DE8C462E4D0679FEFAC5
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.............r.... ........... ....................... ............`................................. ...O........................*..............8............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......T0..4.............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*>.(....o4......*>.(....o4......*>.(....o2......*>.(....o2......*>.(....o2......*v.(....-..(....,..(....+..+..*..{....*"..}....*6..s....}....*..0............(......,...(k.....*....0..4.......s......(....}......}......}......}.....|......(...+*.0..Y.........(....o....r...p(....(c....(f....(g.....(......,&.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):301224
                                                                                                                                                                                                                            Entropy (8bit):5.822993671222324
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:I856+Aq4WBT5TjbyfQ5d2ap3BES3l+3p7z8p5+cyIqrKMjE3g2AJX5ex4uyj0bOP:v56+Aq4WBTWpSqXhpeEioU2U7/c
                                                                                                                                                                                                                            MD5:8E545EE7F96C317AADC4EDA0F0FCF481
                                                                                                                                                                                                                            SHA1:242F4D714B142C10368AA82AF91B0A06E0A4E33F
                                                                                                                                                                                                                            SHA-256:A67BBFB9EFE5C1CD55D3B8209093BA93370F1EAE4F03A0349696D7B45867EAFC
                                                                                                                                                                                                                            SHA-512:77EBC317804B3D0830E76156D93A38980CA113CA80B0A3A2051FDF00D2ABAC96A39AA9BF099AE9CC5AF1E27D14976B5C582096DD6B3AB7F521423FCE6EC11FDE
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........._.Y.1.Y.1.Y.1..l.[.1...>.].1.[.5.[.1.9.|.X.1...l.D.1.Y.0.p.1...n.V.1...Q.M.1...o.X.1...k.X.1.RichY.1.........PE..L...[..@.................J...................`...............................P......2............ ...........................=..T....@...............n...*..............................................@............................................text....I.......J.................. ..`.data...L....`.......N..............@....rsrc........@.......^..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.588649497011045
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:RYTtf+jLXlZfCd8RzDiFrlwkmGWUlupd0IYisq+i0FP27NBY3Yuv+42r:RYpKjlZfC6Fqg7FYiQ7K/Y/+42r
                                                                                                                                                                                                                            MD5:22D4E4267DFE093E5E23C2F3D7741AA4
                                                                                                                                                                                                                            SHA1:AB18989C4442EB204528E64B18000E8E02FA2C50
                                                                                                                                                                                                                            SHA-256:4E296E9B159F5D64E6E71821C9C06260AC02EBB424823ADA64E97DFD418C3CA1
                                                                                                                                                                                                                            SHA-512:7F6D1228F93E454477E3C4250D1D0C78995DE8D9AE07FA585DC8BDCBB4A1046338B66BEFE0BD9BF63F61085657F7080A1C6350403292E484F047F9ED791EF43B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._S............"...0..............M... ...`....@.. ...............................0....`..................................M..O....`..,............:...*...........L..8............................................ ............... ..H............text....-... ...................... ..`.rsrc...,....`.......0..............@..@.reloc...............8..............@..B.................M......H........(..H#...........L................................................{....*"..}....*6.(.....(....*..0..g.........(....... ....0.. .....0. .....". .....&*. .....#. .....!. ......*(,...*(-...*(....*(/...*(0...*(1...*..0..J.......(....(....-.(....(....&~....r...p(.....(.......1.~......(....(......(....*Z(-....(....%-.&*o....*....0.."........r...p..(....(....(....(......&..*...................0..#....... F#.....+..(....-..*..X...X....2..*..0..1.......(....o......,...-..*..+.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):166800
                                                                                                                                                                                                                            Entropy (8bit):5.092225196099469
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:JtayaXxHE9B92Pqg6/rKvXkZ5QwupmY6jCPL:yqNDKvUZZkVlL
                                                                                                                                                                                                                            MD5:2839920AD2E9C4B08F97715D88586056
                                                                                                                                                                                                                            SHA1:88F7544BF59DDD40E3C934C938A20164F3B518F1
                                                                                                                                                                                                                            SHA-256:A655B1BC143B918C6F31B52AEA2726C131F474B70BF7E2DDF36FE48B1E6E279D
                                                                                                                                                                                                                            SHA-512:E26A141021648398F109B41275154FDFCF139845466C9A37E80A1AD43725D914FD574F59706AD68404555BCB36490CB307E7E0C9158A8B8E94F97CB93E4C0F37
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0..Z...........x... ........... ...............................b....`..................................x..O.......8............d...'...........^..p............................................ ............... ..H............text....X... ...Z.................. ..`.rsrc...8............\..............@..@.reloc...............b..............@..B.................x......H........R..............|S......D^......................................j.-.r...ps$...z.s....(....*..0..Y........-.r...ps$...z.o%...s&......r...p(...+.r+..p..((.....(...+........%...%...%...>....(...+*..-.r...ps$...z......(+.........%...o,...*N.sD...%.oC...(....*b.sD...%.s-...oC...(....*2.sD...(....*....0..C........(.....-.rC..ps$...z.-.rM..ps$...z..,...o......}......}......}....*..0..?.........(/...}4......}5......}6......}3.....|4.....(...+..|4...(1...*j.{....,..{....r]..p.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.829205499580206
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:+NjMaZomdl7FUC9mhsCVoNycrjIg9J197j26dIYi5YFK0FP27NBY3Yuv+QgP:+HhShzuD/Bpa6KYiyFjK/Y/+PP
                                                                                                                                                                                                                            MD5:76DC589253A2FDAAA3CDD02E9F5421DD
                                                                                                                                                                                                                            SHA1:A072B9CDDBDC150394643EBFD565A2443AFD9501
                                                                                                                                                                                                                            SHA-256:9AC1C9B0343F4D9638FEB4FA25824AFBD2D829EEBF13E54A5FD2197CED2118B5
                                                                                                                                                                                                                            SHA-512:50A85E3C61A2506912BC0F4547079DAB2C6B60A882127A4C3087C9AB4065C6568B1E8D4AF246D68BFEE7E7347664883A2FC8E00E2E58EA1DE867FE33D8220861
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.a.pi.Hpi.Hpi.H68.Hri.H68.H|i.H68.Hri.H68.Hti.H...Hqi.H...Hyi.Hpi.HFi.H};.Hsi.H};.Hqi.H};.Hqi.H};.Hqi.HRichpi.H........PE..L....q.Z...........!.................$.......0...............................p.......D....@..........................7......D:.......P...............:...*...`..x...................................p4..@............0...............................text............................... ..`.rdata.......0......."..............@..@.data...\....@.......2..............@....rsrc........P.......4..............@..@.reloc..x....`.......6..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):15528
                                                                                                                                                                                                                            Entropy (8bit):6.93175318343703
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:KKE4Nl+ACIYiYF80CX+0tvTS8hFP2bnNr/ZyGMLBVYvmvVKNFUK:ZE4OhIYifS0FP27NBY3Yuv+n
                                                                                                                                                                                                                            MD5:ADF6FCD8199E4DA7F52FBEBD9D9496D7
                                                                                                                                                                                                                            SHA1:17E7E444AB035AE759D3B0E48928B7D23CEC3682
                                                                                                                                                                                                                            SHA-256:C1AF49ACF4E6E9B77C025405CB31E6493F4A9A0080AE48381CE3B36EC5E1D76E
                                                                                                                                                                                                                            SHA-512:72F42DC40B2B1B9C25F0B4BC6E18BCE4B9F144A39442B05E5DF6FB792EA1F5E0645E5CF6251918AF0D81316437982ADBE6892992E4F4323CF48C84A6B08FD809
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....f.P...........!................N)... ...@....... ....................................@..................................(..W....@...................*...`.......'............................................... ............... ..H............text...T.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................0)......H........ ......................P ......................................-.N...._J...a.w~.{...I..}.B.;=.XT.Jh.;.(f.eU/@r.. .......g...^......{i....h]..A,};......g..4..bb.....(..S).]..Ol.[..r....C.BSJB............v4.0.30319......l.......#~..d.......#Strings............#US.........#GUID...........#Blob...........G.........%3................................................................H.-...p.i.....i.....................8.....W.......p.....p.................i.......;.$...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):159368
                                                                                                                                                                                                                            Entropy (8bit):6.32384599449582
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:OcqXDYZbIkCKezJaoCNVljUmcmAs6Jm4AFt2iPaTatnhrOKK/E:9qbKwcB4njeXBSTcpOT/E
                                                                                                                                                                                                                            MD5:7AE17C855F3CC63174E90EA527B6138B
                                                                                                                                                                                                                            SHA1:0FE1E1B2252511F33EDA3FFCF1F8FC8586AB040A
                                                                                                                                                                                                                            SHA-256:26FF04208EC4D26EF4DDD9B3CF01C4D2A1544550BCD59EFDE6F30170053A1170
                                                                                                                                                                                                                            SHA-512:453BA41332A704F491FC9E1EE5FBE9F883EDDB4C26A71D207C93992726E9C5B7FEDC48EEEE2A2087F64B083F9473EE794FB2C8F3B77C9DBCBBC47B67816BD156
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..............Y.......................................................................Rich....................PE..L.....[...........!.........................................................`..................................................P.... ..`............@.......0..(...0...............................0...@............................................text....w.......................... ..`.rdata...A.......P..................@..@.data....6....... ..................@....rsrc...`.... ......................@..@.reloc..2(...0...0..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):301224
                                                                                                                                                                                                                            Entropy (8bit):5.822993671222324
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:I856+Aq4WBT5TjbyfQ5d2ap3BES3l+3p7z8p5+cyIqrKMjE3g2AJX5ex4uyj0bOP:v56+Aq4WBTWpSqXhpeEioU2U7/c
                                                                                                                                                                                                                            MD5:8E545EE7F96C317AADC4EDA0F0FCF481
                                                                                                                                                                                                                            SHA1:242F4D714B142C10368AA82AF91B0A06E0A4E33F
                                                                                                                                                                                                                            SHA-256:A67BBFB9EFE5C1CD55D3B8209093BA93370F1EAE4F03A0349696D7B45867EAFC
                                                                                                                                                                                                                            SHA-512:77EBC317804B3D0830E76156D93A38980CA113CA80B0A3A2051FDF00D2ABAC96A39AA9BF099AE9CC5AF1E27D14976B5C582096DD6B3AB7F521423FCE6EC11FDE
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........._.Y.1.Y.1.Y.1..l.[.1...>.].1.[.5.[.1.9.|.X.1...l.D.1.Y.0.p.1...n.V.1...Q.M.1...o.X.1...k.X.1.RichY.1.........PE..L...[..@.................J...................`...............................P......2............ ...........................=..T....@...............n...*..............................................@............................................text....I.......J.................. ..`.data...L....`.......N..............@....rsrc........@.......^..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):160936
                                                                                                                                                                                                                            Entropy (8bit):5.261187861382329
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:kgeojL/a7WvVHjizsw+Uu5MBBA4TigO8K/1:5jDzvVDizsQWMB1iR/1
                                                                                                                                                                                                                            MD5:F3F2EB62314A960AD5F60B61A8193CBD
                                                                                                                                                                                                                            SHA1:FD77AD6D9F96762CD7EE8D17454D9A7490FD8148
                                                                                                                                                                                                                            SHA-256:0F74E741958310B8E65E3B2393828998DB075EBF4C5B29045707948C65CB03CC
                                                                                                                                                                                                                            SHA-512:A62D09CF93E604AE0282F05842B607216533800F82ABF75E7D0FF1E9DED5F748B9E34D5E38170F1C837A0957D15FC4C6DF101FF2BE48D90C880807D0FB95D3E6
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.Z...........!.........,......n:... ...@....... ....................................@..................................:..S....@..8)...........J...*...........8............................................... ............... ..H............text...t.... ...................... ..`.rsrc...8)...@...*..................@..@.reloc...............H..............@..B................P:......H........#......................P ............................................y.....3....f........UE#.H.NDC..\3,.|7...1...=.w..n.w.P5.y.......p.._Z@B..h..#,._...p...|..qXV..6.......i[..2;.'`..=.;...~....*..0..T.......(..........(....(......r...pr...p(...........s..........,..(......T+...~....(....T.*.~....,.~....o..........~....,.~....(..........*.0..e.......s.......o....s......r5..p.o ....r?..p.o ....rQ..pry..po .....s!........~.....("...s#.....r...p($...&*....0..A.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):22696
                                                                                                                                                                                                                            Entropy (8bit):6.669675167195394
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:PICREYcfpyXOT9Z7a6WmYWXWIYiAh70FP27NBY3Yuv+9gfK:PIiE9QXM1xYioMK/Y/+9gi
                                                                                                                                                                                                                            MD5:657A48C8DA3DE14059498E383EBEF318
                                                                                                                                                                                                                            SHA1:ECCC9AB4E6804EB0581AC5BBD684B7DB5A13F028
                                                                                                                                                                                                                            SHA-256:201EC78B195DCE51330985026A8A4EC641F9ACE53429C5C2F5BB3F1CE7BEEC4A
                                                                                                                                                                                                                            SHA-512:C4F2410470BBEA5680958490B705C828254992441D27E5FB7837957583FDA8D639EA8D9EF00035DB63ABACF28C5E4560D642C1D19F144255908C44F5C37CE8DE
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....oY.........." ..0..$..........:C... ...`....... ....................................@..................................B..O....`...................*...........A............................................... ............... ..H............text...@#... ...$.................. ..`.rsrc........`.......&..............@..@.reloc...............,..............@..B.................C......H.......h'..p............?..X...0A......................................j~....%-.&(....s....%.....*..*...0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*2r...p.(....*......(....*..(....*R. ...(...+%-.&("...*^. ...(#....(...+&~ ...*.s%...*"..s&...*..('...*.*....0........................((
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):143528
                                                                                                                                                                                                                            Entropy (8bit):6.164743567434074
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:oxi8ae06y7Q0kSutmvEmFk0pBa/+h8k/6kY2F8xB0dhqABtx5yoG9Qd7n8K/m:Q0vDkSutmhFpYqtDqAhjMQdYK/m
                                                                                                                                                                                                                            MD5:24DF113016A58EB1D14691CFE947C2C8
                                                                                                                                                                                                                            SHA1:E32B2388C9BCB8BD3EEA1A87626B562A06F5E2F9
                                                                                                                                                                                                                            SHA-256:4DE9980CF1D3B45FC14F69EA4DFF6F456389C5E817344D44D6FA7C1A3276AFB5
                                                                                                                                                                                                                            SHA-512:10DD82391CF51885533A5F9F859D7E79A9016F6E6A24C0A04C9BE08EA4C5A951D73AF467EC89BAB191DAC4B37D51B0C0AB247A24CD05478AD6101A44E9FC0D48
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U..\.........." ..0.............b.... ... ....... .......................`......q[....@.....................................O.... ..8................*...@..........8............................................ ............... ..H............text...8.... ...................... ..`.rsrc...8.... ......................@..@.reloc.......@......................@..B................C.......H........,..L...........,.................................................((...*>..}......}....*..{....*..{....*..{.....{....3..{.....{....()...*.*..0...........%.u....,..........(....*.*z.{....%-.&.+.o*....{....(a...*..(....zN........o+...s,...*.(....z.s-...*..(....zF(U....(O...s....*.(....z.(V...s....*.(....z.s/...*.(....z.s0...*..(....zN........o+...s1...*.(....zrr...p(\....c.M...(O...s2...*.(....zBr...p(Y...s2...*.(....z.s3...*.(....z.(X...s4...*.(!...z.(_...s4...*.(#...z
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):110760
                                                                                                                                                                                                                            Entropy (8bit):5.479763068610726
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:hpKSyD3hoE3PQU9xb1iPKHKWU//6hE2rkQQc76rK/8:qSyLhZ/X9xb1YKqn/unQcOrK/8
                                                                                                                                                                                                                            MD5:3FC875FFEFAC2BBA64E6F2A6A7CFF45B
                                                                                                                                                                                                                            SHA1:CAB48D6D156261CD9612633D70A61DA670D0D093
                                                                                                                                                                                                                            SHA-256:5A12A8D3CA02716C616F56342C920422966ABF79B49C4B1E1C7FF36E97764E1B
                                                                                                                                                                                                                            SHA-512:DDA0B6F0587D7915B490FFA2225E72374A2AA671E2019ABDC72EB7598B642906CF09302575C5B5B495B832FF434D45BAD0650C0409358E5D1786F4561FAE3636
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....oY.........." ..0..v..........j.... ........... ....................................@.....................................O........................*..........t................................................ ............... ..H............text...pu... ...v.................. ..`.rsrc................x..............@..@.reloc..............................@..B................K.......H.......,S..0>..........\.................................................(....*&.l(....k*&.l(....k*..l.l(....k*&.l(....k*&.l(....k*&.l(....k*j~....%-.&(....s....%.....*..*.0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*2r...p.(....*2rG..p.(....*2r...p.(....*2r...p.(....*......(....*...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):16768
                                                                                                                                                                                                                            Entropy (8bit):6.361391591273708
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:LGLxTyHvc4ROgcxAdWXYWJeaPtWsI9A9GaHnhWgN7aJeWw0fnCsqnajt:LgGLROZAdWXYW8aPcyHRN7WEqn1lx
                                                                                                                                                                                                                            MD5:DA04A75DDC22118ED24E0B53E474805A
                                                                                                                                                                                                                            SHA1:2D68C648A6A6371B6046E6C3AF09128230E0AD32
                                                                                                                                                                                                                            SHA-256:66409F670315AFE8610F17A4D3A1EE52D72B6A46C544CEC97544E8385F90AD74
                                                                                                                                                                                                                            SHA-512:26AF01CA25E921465F477A0E1499EDC9E0AC26C23908E5E9B97D3AFD60F3308BFBF2C8CA89EA21878454CD88A1CDDD2F2F0172A6E1E87EF33C56CD7A8D16E9C8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^...........!................^2... ...@....@.. ...............................y....@..................................2..S....@...................#...`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@2......H........#..@...................P ......................................{.v.`)!.t..@.62C<.=...h....X..}.`v.r...g.e...yXa.dat.mwQ.XdJ...M..`..J...$|.j.6W.U.3.r.A.h.....9Q..|..,<g..gy..6V9o%..Gd.r.0...........q....*..0..............q....*...0..............q....*...0.................*.0....................*..0....................*..0............q.........*....0............q.........*....0............*..0................*..0...............*...0...............*...0..........
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25984
                                                                                                                                                                                                                            Entropy (8bit):6.291520154015514
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:1R973o62/KqcAnb05J3w0I5eUGef8s72XBWdvVW2JW8aJcyHRN7WEimpplex:1RZ4nNxnYTb6Blha
                                                                                                                                                                                                                            MD5:E1E9D7D46E5CD9525C5927DC98D9ECC7
                                                                                                                                                                                                                            SHA1:2242627282F9E07E37B274EA36FAC2D3CD9C9110
                                                                                                                                                                                                                            SHA-256:4F81FFD0DC7204DB75AFC35EA4291769B07C440592F28894260EEA76626A23C6
                                                                                                                                                                                                                            SHA-512:DA7AB8C0100E7D074F0E680B28D241940733860DFBDC5B8C78428B76E807F27E44D1C5EC95EE80C0B5098E8C5D5DA4D48BCE86800164F9734A05035220C3FF11
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^.........." ..0..8...........V... ...`....... ....................................@..................................V..O....`...............B...#..........PU............................................... ............... ..H............text....6... ...8.................. ..`.rsrc........`.......:..............@..@.reloc...............@..............@..B.................V......H........0...$...................T........................................(....*..(....z..(....z2.(....s....*2.(....s....*:........o....*.~....*~.-..(......}......}......}....*~.-..(......}......}......}....*Z..}......}......}....*J.{....%-.&.*o....*^.u....,........(....*.*~.{.....{....3..{.....{......*.*&...(....*2...(.......*....0..'........{......,..u....%-.&..(...+(....*(....*n.{....,..(....s....*.q....*..0..a.........{....o0.....,;..{....o2...(......;...3.~.......s......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):354984
                                                                                                                                                                                                                            Entropy (8bit):6.846739611307464
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:jbz6pzdD/rIJXiQTutgCNktQFvmnoxXTS4ubCjrKglegtKop/4:G9FrIJJaqCNktA+SXfUCP9lvtKop/4
                                                                                                                                                                                                                            MD5:D822226C4B35A7305269C8E16E542D3E
                                                                                                                                                                                                                            SHA1:12F92D16608AAC1C39DDC92BA2B5AB8B5AAE6C30
                                                                                                                                                                                                                            SHA-256:FC504A3F68150AFC8C3304E5528867BF99EDDE0F3707406A30371062DDD86A0E
                                                                                                                                                                                                                            SHA-512:3A3A18D96716BD1033C35B06B73674FF6CBBEBE8F5025D0BE260F649FB268745290139B6501B9E208EB43EC5D76C2ABBA0A34C1E2F7E0E9F25E14C41F54E3914
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....I}f.........."...0......D......6.... ... ....@.. ..............................o.....`.....................................O.... ..tA...........@...*........................................................... ............... ..H............text...<.... ...................... ..`.rsrc...tA... ...B..................@..@.reloc...............>..............@..B........................H........'... ...........G...............................................~....*.......*..,!.(...+.1..(...+(....-..(...+(....s....%o....%.o....o....&*....0..5........r...p.s....(.....{....,.*..}....r!..p.s.......(....*"..}....*..(....*.rY..p.....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*...0............j(......j(.....(....,#.(....o....,..(....o ....(....o!.....(......&...s"...(.....(
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1106
                                                                                                                                                                                                                            Entropy (8bit):5.038231865445437
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:2dV8F7H3p2/+XBPpZp2/+XBPqp2/+XBw1irkV:cVg7C+XBR4+XBn+XBvrE
                                                                                                                                                                                                                            MD5:75E66AB540561A0C7D4160271F518243
                                                                                                                                                                                                                            SHA1:AD6501E407D216744B6C3DE76D7664D9581EBAD2
                                                                                                                                                                                                                            SHA-256:091AFFF3BB63024B5A7B14EA30306B6753858FD1A33FC8C98E3B5E65FE92FBE7
                                                                                                                                                                                                                            SHA-512:FCB55C0FDBB984B06AFF2FAFCAEA2596C175AA5A07D2F1A401305D3441338AA266A53D2DE7A7577684884A2E12CE3EE430B2E1D0210684A7EEFAF9EAA0DE115F
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.... <appSettings>.. <add key="DownloadLocation" value=""/>.. </appSettings>.... <runtime>.... <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.... <dependentAssembly>.... <assemblyIdentity name="System.Runtime" publicKeyToken="b03f5f7f11d50a3a" culture="neutral"/>.... <bindingRedirect oldVersion="0.0.0.0-4.0.0.0" newVersion="4.0.0.0"/>.... </dependentAssembly>.... <dependentAssembly>.... <assemblyIdentity name="System.Threading.Tasks" publicKeyToken="b03f5f7f11d50a3a" culture="neutral"/>.... <bindingRedirect oldVersion="0.0.0.0-4.0.0.0" newVersion="4.0.0.0"/>.... </dependentAssembly>.... <dependentAssembly>.... <assemblyIdentity name="System.Net.Http" publicKeyToken="b03f5f7f11d50a3a" culture="neutral"/>.... <bindingRedirect oldVersion="0.0.0.0-4.0.0.0" newVersion="4.0.0.0"/>.... </dependentAssembly>.... </assemblyBinding>.... </runtime>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):35496
                                                                                                                                                                                                                            Entropy (8bit):6.3704146545353355
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:yS78zRHlzbzaxUxU7y7y7y7S7CxUxU7y3K7yTyTTN77xNTOLSxY777DKoRREEK79:yS7DOOqf1RuhC5w78K/m
                                                                                                                                                                                                                            MD5:26592109F19A24EE91F039EBB40038C4
                                                                                                                                                                                                                            SHA1:C8846404EFEB44C6CBB242B4C107F7CCE865AD14
                                                                                                                                                                                                                            SHA-256:E3F74128991C128410498223D4185915528360AD3DA92CD01BC23B19D8C2C670
                                                                                                                                                                                                                            SHA-512:8B031C53F5529D50A80AE2A4803D7C34F9A71A54DA01A912D1DB4D77D9BC1F490AB634A32F2DF6009EB53A2E57CD21975F3E00AF111BFA8320DE550A17509CA1
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>............." ..0..X...........v... ........... ...............................S....`..................................v..O....................`...*...........v..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................v......H........3...B...........................................................0.................(n...........................s)...}................s%...}................s....}................s....}................s....}................s....} ...............s!...}!...............s....}"...............s....}#...............s=...}$...............s9...}%...............s5...}&...............sA...}'...............sE...}(...............s-...})...............s1...}*........(....(....(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):60584
                                                                                                                                                                                                                            Entropy (8bit):6.4260026936119194
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:D0YiwXHy9lkD6vudI9C3dt8dNbm+ESg34o556bYIDwpFGpphsA/FIDbaFLdtlxn+:DxJ8kM9CHJ6bY3zkXX8u4iNa7ogBK/o
                                                                                                                                                                                                                            MD5:550D6E67BB1795B941E91840508BF7F6
                                                                                                                                                                                                                            SHA1:46E22693BDC92F4E8DD8C4C5433D233438A271EF
                                                                                                                                                                                                                            SHA-256:D4B4CEB77A3D429EE21412E5172AAC6E36C553E7D990137F212E5ADD6B9A9336
                                                                                                                                                                                                                            SHA-512:1271BEC8A700AC925B9AC13FDB84FFCCFFA6A1589FA3F9FA1361282C47BB8985A7C8F0335EFDD422E2A708BF2DD46458AEF64B4E2A54B8488F8ED53750337A23
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.............r.... ........... ....................... ............`................................. ...O........................*..............8............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......T0..4.............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*>.(....o4......*>.(....o4......*>.(....o2......*>.(....o2......*>.(....o2......*v.(....-..(....,..(....+..+..*..{....*"..}....*6..s....}....*..0............(......,...(k.....*....0..4.......s......(....}......}......}......}.....|......(...+*.0..Y.........(....o....r...p(....(c....(f....(g.....(......,&.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):31912
                                                                                                                                                                                                                            Entropy (8bit):6.377831305172757
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:i4sSUSsK/Py54Iu67VMam4AX10KIUt0kYcT/EDYZGSPeyc8cHIlkLi7FIYihZM09:izNK/G4IfVswkYLy5L7yYihrK/Y/+mT
                                                                                                                                                                                                                            MD5:CE66CBCDA6D3B5047691C4AFF63CFE79
                                                                                                                                                                                                                            SHA1:358E3A2284798BE1C537756A41721B61643D2BEE
                                                                                                                                                                                                                            SHA-256:B8551ECBE96BB718BAA56E053589A7F16561BFDAB86575441EC5FBE528B32B8C
                                                                                                                                                                                                                            SHA-512:7BC26EDD1C018553B163B75250B5862D26B607C26BDBFB6934F0AC5CE20B04D1956EEAF3915CBCE2129CD992ECA6E1B1C311991427D485CB43969A05431270E4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r.C..........." ..0..J..........~h... ........... ..............................wt....`.................................*h..O....................R...*...........g..8............................................ ............... ..H............text....H... ...J.................. ..`.rsrc................L..............@..@.reloc...............P..............@..B................^h......H........1...5............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*&..(.....*...0...........s.......o.....+X..(.........(....o....o....&..(.........,!..r...po....&...(....o....o....&..r...po....&...(....-...........o ......o....o!.....+...*...........et.......0...........s"...%r...p.o#....%r...pr#..po#....%r+..prA..po#....%r]..p.($...o%...o#....%ro..p.($...o&............o....o'...o#....%r...p.($...o(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):41128
                                                                                                                                                                                                                            Entropy (8bit):6.4006875255426365
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:dQq+jQ+JutCjyVmF8Wq8sBP3/7lpKaDBuz3bzrzlJBOKipq8pdwYv4qzsYiCtVK9:gVutFQF873t3/77KaDBuz3bzrBJBOKig
                                                                                                                                                                                                                            MD5:FDF4712500755002CD0FFD2F7BEA8C2A
                                                                                                                                                                                                                            SHA1:372F4D6F2F19A5DF96FCDEF566AE4761F7AFF2B5
                                                                                                                                                                                                                            SHA-256:D61A675E7D11A6DDF12E4CEBCABFD7BAAA24B86AD7B751BE19788E7A8A5ABE39
                                                                                                                                                                                                                            SHA-512:6484349215D1347FB3D77E6598AF740045AC416EE06370B8D89E91ECBA930E5AFFCE6F4840CE4ECD2214960E1884CCBE49710E5B5C1FEBE0C96F88A099AE2E4E
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z:..........." ..0..n..........&.... ........... ....................................`....................................O.......h............v...*..........@...8............................................ ............... ..H............text...,m... ...n.................. ..`.rsrc...h............p..............@..@.reloc...............t..............@..B........................H........6..PU............................................................{....*"..}....*..{....*"..}....*..~....}......s....}.....(........(.............s*...}....*....0..................,5...(A.....(.........,..~.....(.....s....o.......8..............0....B+......8..... . ...G+.. . ..;....8....~.....(.....s....o.....8....~.....(.....s....o.....+s.o.....~.....(....s....o......(....o ...r...p(!.......,...(.......{.....{....o"....(6...&+...(......s#...(.....+.+..*..0..F.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):20136
                                                                                                                                                                                                                            Entropy (8bit):6.723147332362829
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:BaXxdsvBO/dITrZ+VK6G6IYi+PVl0FP27NBY3Yuv+t+QV:BJZl6GHYiGIK/Y/+tB
                                                                                                                                                                                                                            MD5:14A266CFF3BC7795C208096E24D4791D
                                                                                                                                                                                                                            SHA1:D55A976C562A309B4EEB860E711324A22357470E
                                                                                                                                                                                                                            SHA-256:2C2E075009E736927EBC468CDFB7FF273F73670DF87A057C7B98D18A17CA945D
                                                                                                                                                                                                                            SHA-512:E4A82644052C82F3CFEBAFFF15DEF713F3883F3E32043FAFB607CEE008498329C2E5A5712B0FEE670D68C9CEE127EC70FEC88977B25AF838B5977595268CD252
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W/%..........." ..0.............^;... ...@....... ..............................}.....`..................................;..O....@...............$...*...`......l:..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B................>;......H........$..............................................................F.(....r...p(....*..{....*"..}....*..0...........s......r...po....&.r-..p.(....o....(....o....&.rI..p.(....o....r_..p(....o....&.rg..p.(....o....(....o....&.(......,...ru..po....&..r...po....&.r...po....&.r...p.(....o....(....o....&.r...po....&.r...p.(....o....r...p(....o....&.(....o.....o....( ....*..r...p.(....o!...r...p(....r...p.(....o....r...p(....("...&*..r?..prK..p.(.........(#...("...&*..r?..pr...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):18088
                                                                                                                                                                                                                            Entropy (8bit):6.784018634948529
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:4iqjQN+Pw2X6VUYNVYuKAiIYiUOX0FP27NBY3Yuv+WO:fqjQ8f5uKAvYidgK/Y/+X
                                                                                                                                                                                                                            MD5:CD6CB12E677F6C45BBFE57DED6C90567
                                                                                                                                                                                                                            SHA1:C13525F597974BA46B4B2A71F270B1056332F77B
                                                                                                                                                                                                                            SHA-256:FA0E1B932B5548F39795B9C24106B48D6221600EA7679D6A1D1DEEED1C8D7D8C
                                                                                                                                                                                                                            SHA-512:6D9DC73035F3C053281C9347131C8EF232797507F28271B60428FCA4A82CC43689BF1FA3E6DCE46AE92BC3C0E924745F81E315D2E4D4BD2F5D7991DC78A58FBD
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X4y..........." ..0.............n3... ...@....... ....................................`..................................3..O....@..H................*...`.......2..8............................................ ............... ..H............text...t.... ...................... ..`.rsrc...H....@......................@..@.reloc.......`......................@..B................N3......H........#................................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..(........%-.&r...ps....z(.......(.....*.0..................,..rM..ps....z.(.........,...(....o.......(.......(.....s....o.........(....(......(....o......(....o........&..(.....r...ps....o........*..........tu.......0..B..........(....%-.&+.o.......*&..(.....(....%-.&.+.(......s....o........*.............*.....0..B..........(....%-.&+.o ......*&..(.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):53416
                                                                                                                                                                                                                            Entropy (8bit):6.326182355914875
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:x0Gl7W1UiZTo1ooEqTh0sq/s/MnBOyvUPrYZbkchJYi/S8K/Y/+A:6qQpZTsooEah0sqU/by4UZzhJ7K8K/S
                                                                                                                                                                                                                            MD5:C4BC370961A9E628E64B8FF4586D4DA6
                                                                                                                                                                                                                            SHA1:B391F6A1A54B693F14BA7E8CD58DD8976CDDC992
                                                                                                                                                                                                                            SHA-256:097B7F6F9ED8B63F0E725DE28D6842F6AC93D8105E441C7498385FAAD243A8C1
                                                                                                                                                                                                                            SHA-512:169FD48C453BC95D33137BDAA22225B483CF9BF73CBCE9AFB5B6BF63B62300CC98A968F1D825348CDB8C786232B66D62247659FD809B6B0D7BCBF26C7B4519A4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.................. ........... ....................................@.................................J...O.......$................*..........h...T............................................ ............... ..H............text........ ...................... ..`.rsrc...$...........................@..@.reloc..............................@..B................~.......H........H..Hq...........................................................{....*..{....*V.(......}......}....*...0..A........u........4.,/(.....{.....{....o....,.(.....{.....{....o....*.*.*. ...' )UU.Z(.....{....o....X )UU.Z(.....{....o....X*...0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*...0..2..........(....~.......o"...-.~.....s#...%.o$.....o%...&*...0..A..........(....~.......o"...,)..o&..., .o'...-.~.....o(
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):15086
                                                                                                                                                                                                                            Entropy (8bit):3.1108966039740653
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:FajQ4xW97nzsbzW+0eTODzfHvt0K/UrPdlMoi5U:FTd7nzsbyyqvt1/URiby
                                                                                                                                                                                                                            MD5:BC1059DA39659B80A09C994AE6DB5DB7
                                                                                                                                                                                                                            SHA1:D7E9D74133C98F897B94C42F09B93F10E3274EDB
                                                                                                                                                                                                                            SHA-256:9543C96124919AE5B672FD7C23CCF5946A37FBB83A174112A33DA9FF37449B43
                                                                                                                                                                                                                            SHA-512:F88CD2EC86E52EF31C471E580A9733D7DAAA7E3062C7DBCAAF9E50308934A4B679B364A4C1372D9021D9F5A504D5C310B8F631799AFA3248878B4F55A6CB704B
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:............ .h...6... .... .........00.... ..%..F...(....... ..... .....@...................................2..A!...........................................................3..#.... ..-...................................................................m....................................................`.............. ................................................... ..]...............G........................................................ ...!...&...,{..........................7...................!...!... ... ......U....................U...+.../...,...'.......................,..7....................4..7(...)...-...4...@...>...2...........N.......................*..M&...*.......0...7...Y...j...r...?..i............................(..M...............................................................`...!..}..............._................................................0..!"..............5.......................................................I......................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.8288213942048985
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:tNjMaZomdl7FUC9mhsCVoNycrjIg9J197j26QIYidYFl0FP27NBY3Yuv+tiV:tHhShzuD/Bpa65YiGFuK/Y/+tiV
                                                                                                                                                                                                                            MD5:37E6E1D07988932C4360D74A34B27AE9
                                                                                                                                                                                                                            SHA1:F53AE2462ECC565EFCC28D1C5BB2C285BF899798
                                                                                                                                                                                                                            SHA-256:7E321840FA4F112D0F117D8F4E4DDCA274829693CD1C1189CE1061B6F67550FF
                                                                                                                                                                                                                            SHA-512:EFB94F19A885D20BF602AFE84CDD4FE5E9CE89B3A5B7D0BD5273546A6B5D894AD6F1359545DC6B2EEDE06FCB06790286CB69EFB153F249D7D8EF0C677C5D1B3A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.a.pi.Hpi.Hpi.H68.Hri.H68.H|i.H68.Hri.H68.Hti.H...Hqi.H...Hyi.Hpi.HFi.H};.Hsi.H};.Hqi.H};.Hqi.H};.Hqi.HRichpi.H........PE..L....q.Z...........!.................$.......0...............................p............@..........................7......D:.......P...............:...*...`..x...................................p4..@............0...............................text............................... ..`.rdata.......0......."..............@..@.data...\....@.......2..............@....rsrc........P.......4..............@..@.reloc..x....`.......6..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):116872
                                                                                                                                                                                                                            Entropy (8bit):6.726218253535254
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:8tw0r3S8FpUCSBCLiXdb0NphY3kWlon6ZhPn8agN6K/p:8mWi8FpCBCLybQakA/Pn8agNj/p
                                                                                                                                                                                                                            MD5:B9F4D43230B7FB66B95AF05DC03B32DE
                                                                                                                                                                                                                            SHA1:56F868C56FFF836CA61055499988F965DCA37D26
                                                                                                                                                                                                                            SHA-256:A103634B16841E3A68DD4A6BCBDFC3A1651B8C9F1114D99BF01CA31297664E21
                                                                                                                                                                                                                            SHA-512:50EB5DE7D0A1B5D7E1AC38209488635EF77733C2C78DC39D0D473904128DBFC67D4E3EC388D2C2D79645AFDF03FD1965386F6E6D21553C9A6DAB07A58549FD1E
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V.n.7.=.7.=.7.=.S.<.7.=.S.<o7.=.S.<.7.=._.<.7.=._.<.7.=._.<.7.=.S.<.7.=.7.=.7.=._.<.7.=._.<.7.=._3=.7.=._.<.7.=Rich.7.=........................PE..L...q._]...........!................O........0............................................@.............................T.......<.......................................p...............................@............0...............................text............................... ..`.rdata..4g...0...h..................@..@.data...4...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):16768
                                                                                                                                                                                                                            Entropy (8bit):6.361391591273708
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:LGLxTyHvc4ROgcxAdWXYWJeaPtWsI9A9GaHnhWgN7aJeWw0fnCsqnajt:LgGLROZAdWXYW8aPcyHRN7WEqn1lx
                                                                                                                                                                                                                            MD5:DA04A75DDC22118ED24E0B53E474805A
                                                                                                                                                                                                                            SHA1:2D68C648A6A6371B6046E6C3AF09128230E0AD32
                                                                                                                                                                                                                            SHA-256:66409F670315AFE8610F17A4D3A1EE52D72B6A46C544CEC97544E8385F90AD74
                                                                                                                                                                                                                            SHA-512:26AF01CA25E921465F477A0E1499EDC9E0AC26C23908E5E9B97D3AFD60F3308BFBF2C8CA89EA21878454CD88A1CDDD2F2F0172A6E1E87EF33C56CD7A8D16E9C8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^...........!................^2... ...@....@.. ...............................y....@..................................2..S....@...................#...`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@2......H........#..@...................P ......................................{.v.`)!.t..@.62C<.=...h....X..}.`v.r...g.e...yXa.dat.mwQ.XdJ...M..`..J...$|.j.6W.U.3.r.A.h.....9Q..|..,<g..gy..6V9o%..Gd.r.0...........q....*..0..............q....*...0..............q....*...0.................*.0....................*..0....................*..0............q.........*....0............q.........*....0............*..0................*..0...............*...0...............*...0..........
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):15086
                                                                                                                                                                                                                            Entropy (8bit):3.1108966039740653
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:FajQ4xW97nzsbzW+0eTODzfHvt0K/UrPdlMoi5U:FTd7nzsbyyqvt1/URiby
                                                                                                                                                                                                                            MD5:BC1059DA39659B80A09C994AE6DB5DB7
                                                                                                                                                                                                                            SHA1:D7E9D74133C98F897B94C42F09B93F10E3274EDB
                                                                                                                                                                                                                            SHA-256:9543C96124919AE5B672FD7C23CCF5946A37FBB83A174112A33DA9FF37449B43
                                                                                                                                                                                                                            SHA-512:F88CD2EC86E52EF31C471E580A9733D7DAAA7E3062C7DBCAAF9E50308934A4B679B364A4C1372D9021D9F5A504D5C310B8F631799AFA3248878B4F55A6CB704B
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:............ .h...6... .... .........00.... ..%..F...(....... ..... .....@...................................2..A!...........................................................3..#.... ..-...................................................................m....................................................`.............. ................................................... ..]...............G........................................................ ...!...&...,{..........................7...................!...!... ... ......U....................U...+.../...,...'.......................,..7....................4..7(...)...-...4...@...>...2...........N.......................*..M&...*.......0...7...Y...j...r...?..i............................(..M...............................................................`...!..}..............._................................................0..!"..............5.......................................................I......................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):143528
                                                                                                                                                                                                                            Entropy (8bit):6.164743567434074
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:oxi8ae06y7Q0kSutmvEmFk0pBa/+h8k/6kY2F8xB0dhqABtx5yoG9Qd7n8K/m:Q0vDkSutmhFpYqtDqAhjMQdYK/m
                                                                                                                                                                                                                            MD5:24DF113016A58EB1D14691CFE947C2C8
                                                                                                                                                                                                                            SHA1:E32B2388C9BCB8BD3EEA1A87626B562A06F5E2F9
                                                                                                                                                                                                                            SHA-256:4DE9980CF1D3B45FC14F69EA4DFF6F456389C5E817344D44D6FA7C1A3276AFB5
                                                                                                                                                                                                                            SHA-512:10DD82391CF51885533A5F9F859D7E79A9016F6E6A24C0A04C9BE08EA4C5A951D73AF467EC89BAB191DAC4B37D51B0C0AB247A24CD05478AD6101A44E9FC0D48
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U..\.........." ..0.............b.... ... ....... .......................`......q[....@.....................................O.... ..8................*...@..........8............................................ ............... ..H............text...8.... ...................... ..`.rsrc...8.... ......................@..@.reloc.......@......................@..B................C.......H........,..L...........,.................................................((...*>..}......}....*..{....*..{....*..{.....{....3..{.....{....()...*.*..0...........%.u....,..........(....*.*z.{....%-.&.+.o*....{....(a...*..(....zN........o+...s,...*.(....z.s-...*..(....zF(U....(O...s....*.(....z.(V...s....*.(....z.s/...*.(....z.s0...*..(....zN........o+...s1...*.(....zrr...p(\....c.M...(O...s2...*.(....zBr...p(Y...s2...*.(....z.s3...*.(....z.(X...s4...*.(!...z.(_...s4...*.(#...z
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):75432
                                                                                                                                                                                                                            Entropy (8bit):6.020201057914009
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:mjb2NmqeZsE64aEKbMsZG0EN3ovewf8KnWE7LJ/ZEBiUN7TK/P:mjbUmqWL3M/WkV2ZNHK/P
                                                                                                                                                                                                                            MD5:8DC8D595216B1D7703575B77282F7147
                                                                                                                                                                                                                            SHA1:5FBA510AB9D9677B5AF28757BFCFC3E6EE3228F5
                                                                                                                                                                                                                            SHA-256:7A8833790323071279C55854F35A1A802BF5D5766CABCFA381889460F95D5864
                                                                                                                                                                                                                            SHA-512:F1E79E49CF5F10C9BC88D2AAA078FABD772027360A8C9692334AC3BBCDFEEDD93C2C6234F4DE6C6B4AFBD443FD6315633FE8943229EE0CB8CA6A6F29C2AE97EE
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e.Z..........." ..0.............".... ... ....... .......................`......E.....`.....................................O.... ...................*...@..........T............................................ ............... ..H............text...(.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......pG...................... .......................................6.......(....*.~....*F~J......o.......*N........s....o...+*..0............(........~......o2...*.0............(........~K.....o....*.0..%.........(..........(........~L.......o....*....0..H.........(..........(........~M....o.............(....(.........{........o....*2~$....o....*2~#....o....*2~H....oz...*6~I.....o~...*:~J......o....*2~%....o....*2~&....o....*>.(.......o....*...0..N........,........s.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3070013
                                                                                                                                                                                                                            Entropy (8bit):6.39701754184779
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:BdJYVM+9JtzZWnoS2VC23aun8+f5KuGP+VYNCWNtdH333t7:HJYVM+LtVt3P/KuGP+VYNCuf333V
                                                                                                                                                                                                                            MD5:A2386053A831B1C65F9BB923F4F17A7B
                                                                                                                                                                                                                            SHA1:530BC9411C100138963776A527966EA98D2D1FD9
                                                                                                                                                                                                                            SHA-256:3AE0793AF74140734EC43A261FAD664E5871890F28F9CCC692B68B3D6E1A26E5
                                                                                                                                                                                                                            SHA-512:2E149D81B13101F9C38EE67396A92527AE5BFD8761D8187BAB635C7736B316E31D9A246DC14D934F28EEE4076F9B3FA78751F912D9CFEB6A032470997382D76F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....gf..................*...........*.......*...@..........................P/...........@......@...................P,.n.....,.j:....,.$....................................................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.rsrc...$.....,.......+.............@..@.............`0......./.............@..@........................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):41128
                                                                                                                                                                                                                            Entropy (8bit):6.4006875255426365
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:dQq+jQ+JutCjyVmF8Wq8sBP3/7lpKaDBuz3bzrzlJBOKipq8pdwYv4qzsYiCtVK9:gVutFQF873t3/77KaDBuz3bzrBJBOKig
                                                                                                                                                                                                                            MD5:FDF4712500755002CD0FFD2F7BEA8C2A
                                                                                                                                                                                                                            SHA1:372F4D6F2F19A5DF96FCDEF566AE4761F7AFF2B5
                                                                                                                                                                                                                            SHA-256:D61A675E7D11A6DDF12E4CEBCABFD7BAAA24B86AD7B751BE19788E7A8A5ABE39
                                                                                                                                                                                                                            SHA-512:6484349215D1347FB3D77E6598AF740045AC416EE06370B8D89E91ECBA930E5AFFCE6F4840CE4ECD2214960E1884CCBE49710E5B5C1FEBE0C96F88A099AE2E4E
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z:..........." ..0..n..........&.... ........... ....................................`....................................O.......h............v...*..........@...8............................................ ............... ..H............text...,m... ...n.................. ..`.rsrc...h............p..............@..@.reloc...............t..............@..B........................H........6..PU............................................................{....*"..}....*..{....*"..}....*..~....}......s....}.....(........(.............s*...}....*....0..................,5...(A.....(.........,..~.....(.....s....o.......8..............0....B+......8..... . ...G+.. . ..;....8....~.....(.....s....o.....8....~.....(.....s....o.....+s.o.....~.....(....s....o......(....o ...r...p(!.......,...(.......{.....{....o"....(6...&+...(......s#...(.....+.+..*..0..F.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):29352
                                                                                                                                                                                                                            Entropy (8bit):6.56368110636982
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:vT6rilChUvVsYQTJMS6V4B6PYikK/Y/+V7:7qSsYOwP7kK/77
                                                                                                                                                                                                                            MD5:1CFBF0CBA3C87653D9639ADA438C3291
                                                                                                                                                                                                                            SHA1:07E36A34319EAD85857CC022E277B69EA132750B
                                                                                                                                                                                                                            SHA-256:3525FCE82E2687D8EFAF992147B196881818856EA9EA851A8DC930751329A8DD
                                                                                                                                                                                                                            SHA-512:E95FC978E889BD62E92975EFD8F39161B6E43FE97451068552E3A71635943F990E4E8697323794D75F77BB12F3DE4E2CFADB5B9D80EF90F1992C82298EBFD00B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.i..........." ..0..@...........^... ...`....... ....................................`.................................:^..O....`...............H...*..........|]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc...............F..............@..B................n^......H........1...+............................................................{....*:.(......}....*..0..)........u..........,.(.....{.....{....o....*.*.*v .5Q' )UU.Z(.....{....o....X*..0..:........r...p......%..{.......%q.........-.&.+.......o.....(....*..{....*:.(......}....*....0..)........u..........,.(.....{.....{....o....*.*.*v . .q )UU.Z(.....{....o....X*..0..:........r-..p......%..{.......%q.........-.&.+.......o.....(....*..{....*..{....*V.(......}......}....*.0..A.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):432
                                                                                                                                                                                                                            Entropy (8bit):5.0141792226861375
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:MMHdGzNFF7ap+5v5OXrRf/2//FicYo4xT:JduPF7NhOXrRH2/d9y
                                                                                                                                                                                                                            MD5:8F6EB9E75E6A6F0C0D58FB697C10CEDF
                                                                                                                                                                                                                            SHA1:6944935DFDC33E0C6DB26869BF25EDA85A2622D8
                                                                                                                                                                                                                            SHA-256:E2B8677434501735FB0233ED0CC2FFEE5BF6FB4387C51DBCB2585A70E42E4F08
                                                                                                                                                                                                                            SHA-512:A946252B2E3705EAE751A2672D4ADE1499ECEB28C48B4BE6150C4201EE20A7B9A4450C75E06B07F5DAA3528041A566931D988FBD0C2EA90240D61008895BA44A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):117928
                                                                                                                                                                                                                            Entropy (8bit):6.160360774488817
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:Hzne5lbC/VlCG2OWMMdWWbWbWw+Hfz+8lKbchOD07PQCFP1IYmDe/WAbBuhEK/a:HFO4WMMdWWbWbWw+Hfz+8lKbchOD07PP
                                                                                                                                                                                                                            MD5:FDFDFE021B53B630939D27C6C90CB435
                                                                                                                                                                                                                            SHA1:AA0987A6EA6987BB9930B9167EC31C249EF9D885
                                                                                                                                                                                                                            SHA-256:D753A7EF62BABC2ADB5D1DBEB0BEBAA2B042CC01CC219726F32F761BBB0A711D
                                                                                                                                                                                                                            SHA-512:1FD0C74D0ED3AC4DF26D3E95C0F133E8024D77D1FD06E0C76C630D6AAC7B81124AA1DCA7CFFAC43BC34252A057414F8C3F8EC63A805323B1EF892B5F6A277D3B
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8............" ..0................. ........... ..............................U.....`.................................w...O........................*..............T............................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.........................................................................{ ...*..{!...*V.(".....} .....}!...*...0..A........u........4.,/(#....{ ....{ ...o$...,.(%....{!....{!...o&...*.*.*. '.(k )UU.Z(#....{ ...o'...X )UU.Z(%....{!...o(...X*...0..b........r...p......%..{ ......%q.........-.&.+.......o)....%..{!......%q.........-.&.+.......o)....(*...*>..su...%.}^...*...0...........(+...,..*...(....o.....8t....o......-2.{,....{-.....g...%..".o.....(/...s0...sk....88....{,...r
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):60584
                                                                                                                                                                                                                            Entropy (8bit):6.4260026936119194
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:D0YiwXHy9lkD6vudI9C3dt8dNbm+ESg34o556bYIDwpFGpphsA/FIDbaFLdtlxn+:DxJ8kM9CHJ6bY3zkXX8u4iNa7ogBK/o
                                                                                                                                                                                                                            MD5:550D6E67BB1795B941E91840508BF7F6
                                                                                                                                                                                                                            SHA1:46E22693BDC92F4E8DD8C4C5433D233438A271EF
                                                                                                                                                                                                                            SHA-256:D4B4CEB77A3D429EE21412E5172AAC6E36C553E7D990137F212E5ADD6B9A9336
                                                                                                                                                                                                                            SHA-512:1271BEC8A700AC925B9AC13FDB84FFCCFFA6A1589FA3F9FA1361282C47BB8985A7C8F0335EFDD422E2A708BF2DD46458AEF64B4E2A54B8488F8ED53750337A23
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.............r.... ........... ....................... ............`................................. ...O........................*..............8............................................ ............... ..H............text...x.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................T.......H.......T0..4.............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*>.(....o4......*>.(....o4......*>.(....o2......*>.(....o2......*>.(....o2......*v.(....-..(....,..(....+..+..*..{....*"..}....*6..s....}....*..0............(......,...(k.....*....0..4.......s......(....}......}......}......}.....|......(...+*.0..Y.........(....o....r...p(....(c....(f....(g.....(......,&.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):22184
                                                                                                                                                                                                                            Entropy (8bit):6.685941492131545
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:1hKpVrz0BH8aZqmgBTKDAATaYIYikfF0FP27NBY3Yuv+8N:1hKpVcB15KO7aBYimOK/Y/+g
                                                                                                                                                                                                                            MD5:AAA9DA932D572F5B22CBEE1B4E479ED6
                                                                                                                                                                                                                            SHA1:D708727DED1298610C2E3D72C8792F12FC60CFF2
                                                                                                                                                                                                                            SHA-256:73B55714DB609A1712FD4FC420CE18441E41BB7E3E94D73B11AE28C68CCB1124
                                                                                                                                                                                                                            SHA-512:40A8E2CB18FB2D68F0945B6FBF259FA9331327116A6D21A85AAE6AA12600F7FDD3737B5E84E0AE04C584442016882926D9201E16C25EB937838C8BAC24358779
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0.."...........A... ...`....... ...............................6....`..................................A..O....`..`............,...*...........@..T............................................ ............... ..H............text...."... ...".................. ..`.rsrc...`....`.......$..............@..@.reloc...............*..............@..B.................A......H........'.......................@.......................................(....*..0...............(....o........(....s....*...0............(.......(....s....(....*6r...p..(....*.0.._.......s!.....s....}.....{....r...p.r'..p(....o.........."...s....(....%~....(....,..{....o....s....z*..0..#.......(......-...(....*..3...(....*s....z...(....%~....(....,.r=..p.r'..p(....s....z*..0..#.......(......-..(....&*..3..(....&*s....z..0..7..........~....%-.&~..........s....%.....(.........
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):432
                                                                                                                                                                                                                            Entropy (8bit):5.0141792226861375
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:MMHdGzNFF7ap+5v5OXrRf/2//FicYo4xT:JduPF7NhOXrRH2/d9y
                                                                                                                                                                                                                            MD5:8F6EB9E75E6A6F0C0D58FB697C10CEDF
                                                                                                                                                                                                                            SHA1:6944935DFDC33E0C6DB26869BF25EDA85A2622D8
                                                                                                                                                                                                                            SHA-256:E2B8677434501735FB0233ED0CC2FFEE5BF6FB4387C51DBCB2585A70E42E4F08
                                                                                                                                                                                                                            SHA-512:A946252B2E3705EAE751A2672D4ADE1499ECEB28C48B4BE6150C4201EE20A7B9A4450C75E06B07F5DAA3528041A566931D988FBD0C2EA90240D61008895BA44A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):20136
                                                                                                                                                                                                                            Entropy (8bit):6.723147332362829
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:BaXxdsvBO/dITrZ+VK6G6IYi+PVl0FP27NBY3Yuv+t+QV:BJZl6GHYiGIK/Y/+tB
                                                                                                                                                                                                                            MD5:14A266CFF3BC7795C208096E24D4791D
                                                                                                                                                                                                                            SHA1:D55A976C562A309B4EEB860E711324A22357470E
                                                                                                                                                                                                                            SHA-256:2C2E075009E736927EBC468CDFB7FF273F73670DF87A057C7B98D18A17CA945D
                                                                                                                                                                                                                            SHA-512:E4A82644052C82F3CFEBAFFF15DEF713F3883F3E32043FAFB607CEE008498329C2E5A5712B0FEE670D68C9CEE127EC70FEC88977B25AF838B5977595268CD252
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W/%..........." ..0.............^;... ...@....... ..............................}.....`..................................;..O....@...............$...*...`......l:..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B................>;......H........$..............................................................F.(....r...p(....*..{....*"..}....*..0...........s......r...po....&.r-..p.(....o....(....o....&.rI..p.(....o....r_..p(....o....&.rg..p.(....o....(....o....&.(......,...ru..po....&..r...po....&.r...po....&.r...p.(....o....(....o....&.r...po....&.r...p.(....o....r...p(....o....&.(....o.....o....( ....*..r...p.(....o!...r...p(....r...p.(....o....r...p(....("...&*..r?..prK..p.(.........(#...("...&*..r?..pr...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):19624
                                                                                                                                                                                                                            Entropy (8bit):6.761472837087098
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:pwG3NNuGs7lkviba8FLdwIYieB0FP27NBY3Yuv+4pdS:F+V7PpFLdZYixK/Y/+4S
                                                                                                                                                                                                                            MD5:12A69C58D97C26D0132D493111E42345
                                                                                                                                                                                                                            SHA1:0DCC8570C7D76B660746A0F657607864F8764AD4
                                                                                                                                                                                                                            SHA-256:E6682B67F0C489BEB53C93C399D46CEAEBDD7096AD7DB984BF99DCC68E476F4C
                                                                                                                                                                                                                            SHA-512:3335371222BB282C55F1309432CD776CD146EFA9B6D17BF23997EFA6E3A741512FD95B9382EB719F400C6A70BD13E6A445A6011716B4C7637CF1083C8D669BE6
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..............8... ...@....... ...............................P....`.................................j8..O....@..............."...*...`.......7..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`....... ..............@..B.................8......H.......L'..`............................................................0..?.........(....}.......}.......}.......}......|......(...+..|....(....*..0..7.........(....}.......}.......}......|......(...+..|....(....*..0../.........(....}.......}......|......(...+..|....(....*..0..7.........(....}.......}.......}......|......(...+..|....(....*6..(...+(....*..(....*..(....*..{..........%..#...(.....%..!...(.....(.....(....*.0..e........{......E....8............(....o ......(!...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1106
                                                                                                                                                                                                                            Entropy (8bit):5.038231865445437
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:2dV8F7H3p2/+XBPpZp2/+XBPqp2/+XBw1irkV:cVg7C+XBR4+XBn+XBvrE
                                                                                                                                                                                                                            MD5:75E66AB540561A0C7D4160271F518243
                                                                                                                                                                                                                            SHA1:AD6501E407D216744B6C3DE76D7664D9581EBAD2
                                                                                                                                                                                                                            SHA-256:091AFFF3BB63024B5A7B14EA30306B6753858FD1A33FC8C98E3B5E65FE92FBE7
                                                                                                                                                                                                                            SHA-512:FCB55C0FDBB984B06AFF2FAFCAEA2596C175AA5A07D2F1A401305D3441338AA266A53D2DE7A7577684884A2E12CE3EE430B2E1D0210684A7EEFAF9EAA0DE115F
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.... <appSettings>.. <add key="DownloadLocation" value=""/>.. </appSettings>.... <runtime>.... <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.... <dependentAssembly>.... <assemblyIdentity name="System.Runtime" publicKeyToken="b03f5f7f11d50a3a" culture="neutral"/>.... <bindingRedirect oldVersion="0.0.0.0-4.0.0.0" newVersion="4.0.0.0"/>.... </dependentAssembly>.... <dependentAssembly>.... <assemblyIdentity name="System.Threading.Tasks" publicKeyToken="b03f5f7f11d50a3a" culture="neutral"/>.... <bindingRedirect oldVersion="0.0.0.0-4.0.0.0" newVersion="4.0.0.0"/>.... </dependentAssembly>.... <dependentAssembly>.... <assemblyIdentity name="System.Net.Http" publicKeyToken="b03f5f7f11d50a3a" culture="neutral"/>.... <bindingRedirect oldVersion="0.0.0.0-4.0.0.0" newVersion="4.0.0.0"/>.... </dependentAssembly>.... </assemblyBinding>.... </runtime>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):48256
                                                                                                                                                                                                                            Entropy (8bit):6.234996524588368
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:AMWC5N7mKWPKz4VJ4e0jeuTGlBh0JzqPPxofk3l9z2I:Y67hCfV8j3TGlB+JsafkHzP
                                                                                                                                                                                                                            MD5:37EB7CCE6E282D3572D64C880E1AC3C8
                                                                                                                                                                                                                            SHA1:9A2952589A19D650932E7C633577EB9AFC04F959
                                                                                                                                                                                                                            SHA-256:039155F155C5D14F5B73F4EE2CD1FBD9290F391B88A1D2A0BA815569205EDB74
                                                                                                                                                                                                                            SHA-512:E3C2EF1CC52E3AA5BD77B74DEC93A4FC9E908DF823426F13CA304265D41605DE51970CC8C7E18C2E76319D3225707B2EA2D8613402A25C4FBD3951E70FCFD521
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....v..........." ..0.................. ........... ....................................`.....................................O........................(..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........=..da..........0.................................................(....*..(....*^.(.......>...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....**.-..(....*..s....z.~....*...0..........(....,..*..(.....o.......&...*...................0...........(.......(....-..,..*.*.(....,.r...p......%...%...(....*..( ...*.(....,.r...p......%...%...%...(....*...(!...*.(....,!r...p......%...%...%...%...(....*....("...*..,&(....,..r...pr...p.(....(#...*..($...*.*.(.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):19112
                                                                                                                                                                                                                            Entropy (8bit):6.821071301483957
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:LVVVVVwhr+vtlzIYilpm0FP27NBY3Yuv+Z:LVVVVVwhKvtl8YijnK/Y/+Z
                                                                                                                                                                                                                            MD5:64E2269D156CA2AA5704E2E0908506F9
                                                                                                                                                                                                                            SHA1:0F7D6EECE52D8A9A91E389736BE1092739AA3014
                                                                                                                                                                                                                            SHA-256:B012720952E3FE9CB303E9EDB4314F924CB388D9C24FB63A968A3479113B665D
                                                                                                                                                                                                                            SHA-512:C845E7EB96ED29C564C28D42F07F5EB81C27568F0F89C343533384BF8E704B99566EA073E46259D9F3740A7A3D41AAB5BFA78AEAB05697100B3A179F5C1EDFB6
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c............" ..0..............6... ...@....... ..............................hj....`.................................16..O....@............... ...*...`......t5..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................e6......H.......("..L............................................................~....*.......*..s....*..s....*..0..B.......(....,.*s....(....(....(....(....(....(.....(....(....(.....(....*..(...+*F.(...+(...+(...+*F.(...+(...+(...+*F.(...+(...+(...+*.0..f........(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+(...+*..(...+*...0...........-..*....8.......%o.....%o.....o........E........ ...>...+X..(....-...(....+....(......+:..(....-...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):26752
                                                                                                                                                                                                                            Entropy (8bit):6.512503595653532
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:DulwnBhYlTVv2wK5idcgF4of1n6K9zUYJ:ywHYFtKYdcg/f1nXzUYJ
                                                                                                                                                                                                                            MD5:970B6E6478AE3AB699F277D77DE0CD19
                                                                                                                                                                                                                            SHA1:5475CB28998D419B4714343FFA9511FF46322AC2
                                                                                                                                                                                                                            SHA-256:5DC372A10F345B1F00EC6A8FA1A2CE569F7E5D63E4F1F8631BE367E46BFA34F4
                                                                                                                                                                                                                            SHA-512:F3AD2088C5D3FCB770C6D8212650EED95507E107A34F9468CA9DB99DEFD8838443A95E0B59A5A6CB65A18EBBC529110C5348513A321B44223F537096C6D7D6E0
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$:............" ..0..4...........S... ...`....... ....................................`..................................S..O....`...............@...(...........R..T............................................ ............... ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@.reloc...............>..............@..B.................S......H........'..P*..................,R........................................(....*..(....*^.(.......1...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....*..(....*..(....*..(....*..(....*:.(......}....*..{....*:.(......}....*..{....*:.(......}....*..{....*..(....*:.(......}....*..{....*^.(.......2...%...}....*:.(......}....*..{....*z.(......}.......2...%...}....*V.(......}......}....*..{....*..{....*:.(......}....*..{....*..{....*"..}....*..{....*"..}....*..{
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):149896
                                                                                                                                                                                                                            Entropy (8bit):6.136390335470081
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:PcRKLBm0ELV6Ra+eKBL24YzRk2XDuzEdnp+4WSspmfxPapkwN5RGV5xz/OEYW58R:qI0KRHeKBszRk2aApjsp7pBtZGh9
                                                                                                                                                                                                                            MD5:70B1C15FDBBFB88F91965DC7BBC5527F
                                                                                                                                                                                                                            SHA1:A473571DAC42819933CD7EF0C604F1EA0614D2F3
                                                                                                                                                                                                                            SHA-256:109878A7A6F6BD13637B7E3A2EBC22D37423716ECD4E954CC09BACB84B92F62B
                                                                                                                                                                                                                            SHA-512:C496EE2DDF6C401E9E48FB6D739C44200EBFE36B516E7608CECB3E32FEB620CE1531CC5DE26B1A4CD033C65FD002D6B6315B746CFB8B4D047A2954F6F33CA0A4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5A............" ..0..............;... ...@....... ..............................Ri....`.................................N;..O....@...............&...#...`......X:..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B.................;......H.......h....Y..........H'.......9........................................(...+*.~....*.~....*.~....*..%-.&(....*..%-.&~ ...*....0..........(!......o"......(7.......*...................0..........(!......o...+...(...+....*....................~$...%-.&~%.....&...s'...%.$....(...+*.0..D.............,:......o(.....,......o(....3.........o)....(....+.....(...+.*.0..9.......s*......}+.....},.....}-................s/... ....(B...&*....0..$........,...r...p......%.....o~......o0...*
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):432
                                                                                                                                                                                                                            Entropy (8bit):5.0141792226861375
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:MMHdGzNFF7ap+5v5OXrRf/2//FicYo4xT:JduPF7NhOXrRH2/d9y
                                                                                                                                                                                                                            MD5:8F6EB9E75E6A6F0C0D58FB697C10CEDF
                                                                                                                                                                                                                            SHA1:6944935DFDC33E0C6DB26869BF25EDA85A2622D8
                                                                                                                                                                                                                            SHA-256:E2B8677434501735FB0233ED0CC2FFEE5BF6FB4387C51DBCB2585A70E42E4F08
                                                                                                                                                                                                                            SHA-512:A946252B2E3705EAE751A2672D4ADE1499ECEB28C48B4BE6150C4201EE20A7B9A4450C75E06B07F5DAA3528041A566931D988FBD0C2EA90240D61008895BA44A
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0.0" newVersion="13.0.0.0" />.. </dependentAssembly>.. </assemblyBinding>.. </runtime>..</configuration>
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):88192
                                                                                                                                                                                                                            Entropy (8bit):6.25584016939133
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:0kUuBN7CjSkp9oa++t1BVryVKXDORdDeCNia6Lj4Fu/qSGnJdo0Wzs:ju/t/VryVKXeDezVLj4F/JdWQ
                                                                                                                                                                                                                            MD5:4186A905DC180A0CC2110403727BD792
                                                                                                                                                                                                                            SHA1:E0563D20CA7E95688A60F4BFC1AB0127EAE1F651
                                                                                                                                                                                                                            SHA-256:40DCB80A87A762745D0A15294B5CA7783A9EAD1D93AD352D25B5EDAF4994651E
                                                                                                                                                                                                                            SHA-512:1C3459232B41C531F01BCCE54E46799F2FB3FCD6C87D7F908C633ABCC718D9726D98E65F964B1A870D416A38F545971779054FE65F7C1299905FC7DC24FA2DEC
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&..........>E... ...`....... ....................................`..................................D..O....`...............0...(...........C..T............................................ ............... ..H............text...D%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc..............................@..B.................E......H........l..@...........02..0...`C........................................(....*..(....*^.(.......k...%...}....*:.(......}....*:.(......}....*:.(......}....*:.(......}....*.~....*..0..........(....,..*..(.....o ......&...*...................0...........(.......(!...-..,..*.*.(....,.r...p......%...%...("...*..(#...*.(....,.r...p......%...%...%...("...*...($...*.(....,!r...p......%...%...%...%...("...*....(%...*..,&(....,..r...pr...p.("...(&...*..('...*.*.(....,.r...p......%...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1112
                                                                                                                                                                                                                            Entropy (8bit):5.030466366630491
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:JdArztW1oF7Nv+IcvH2/+GVTcvH2/+GVhOXrRH2/d9y:3Arzcq7h+Iag+GMg+G27Rgdw
                                                                                                                                                                                                                            MD5:B94AE93769D64791440B3C36CC82AC69
                                                                                                                                                                                                                            SHA1:E4AAAD9A0FB51051C8B25F768BC1563543F132C0
                                                                                                                                                                                                                            SHA-256:432BFD182828A531147812566CB3439702A243BB7A4C45CC816192F9CB91D4A5
                                                                                                                                                                                                                            SHA-512:AD978C59980C0194357D5070D53EA77C334493D14593C141B9DBEEF835FC688FD90C99236D687F50860FA7F4FD4125650E432A61EDF7917C77E4EE4E5E3D4E66
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup> .. <supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.8" />.. </startup>.. <runtime>.. <legacyCorruptedStateExceptionsPolicy enabled="true" />.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.Expression.Interactions" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.5.0.0" newVersion="4.5.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Windows.Interactivity" publicKeyToken="31bf3856ad364e35" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-4.5.0.0" newVersion="4.5.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-13.0.0
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1192
                                                                                                                                                                                                                            Entropy (8bit):5.059106104983516
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:JduPF7NV+TkH2/17zVVXBOH2/17zVQ7uH2/XVUrPH2/+C9y:327Gwg1BOg1SagXSg+Cw
                                                                                                                                                                                                                            MD5:66373624F8B60F41B8FEC0E61779C0AC
                                                                                                                                                                                                                            SHA1:0D3BE3C009F0A2260F89C3FBC9FFEBA0061C17F2
                                                                                                                                                                                                                            SHA-256:FE0A5830D875B8BD0864BF4F85705D4F2E3D7A575C07B2B5A18041558DBA1386
                                                                                                                                                                                                                            SHA-512:74F084B2697F936122E371042FEF5740BF205914B3FA276F8F7C72561680BF2C39A7DD2970BDEDF36AACC20970CD9552A719211F30090881E498815D91C6CDD0
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <runtime>.. <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.core" publicKeyToken="1488e028ca7ab535" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="SQLitePCLRaw.batteries_v2" publicKeyToken="8226ea5df37bcae9" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-2.1.6.2060" newVersion="2.1.6.2060" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />.. <bindingRedirect oldVersion="0.0.0.0-6.0.0.0" newVersion="6.0.0.0" />.. </dependentAssembly>.. <dependentAssembly>.. <assemblyIdentity name="System.Memory" publicKeyToken="cc7b13ffc
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):53416
                                                                                                                                                                                                                            Entropy (8bit):6.326182355914875
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:x0Gl7W1UiZTo1ooEqTh0sq/s/MnBOyvUPrYZbkchJYi/S8K/Y/+A:6qQpZTsooEah0sqU/by4UZzhJ7K8K/S
                                                                                                                                                                                                                            MD5:C4BC370961A9E628E64B8FF4586D4DA6
                                                                                                                                                                                                                            SHA1:B391F6A1A54B693F14BA7E8CD58DD8976CDDC992
                                                                                                                                                                                                                            SHA-256:097B7F6F9ED8B63F0E725DE28D6842F6AC93D8105E441C7498385FAAD243A8C1
                                                                                                                                                                                                                            SHA-512:169FD48C453BC95D33137BDAA22225B483CF9BF73CBCE9AFB5B6BF63B62300CC98A968F1D825348CDB8C786232B66D62247659FD809B6B0D7BCBF26C7B4519A4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0.................. ........... ....................................@.................................J...O.......$................*..........h...T............................................ ............... ..H............text........ ...................... ..`.rsrc...$...........................@..@.reloc..............................@..B................~.......H........H..Hq...........................................................{....*..{....*V.(......}......}....*...0..A........u........4.,/(.....{.....{....o....,.(.....{.....{....o....*.*.*. ...' )UU.Z(.....{....o....X )UU.Z(.....{....o....X*...0..b........r...p......%..{.......%q.........-.&.+.......o ....%..{.......%q.........-.&.+.......o ....(!...*...0..2..........(....~.......o"...-.~.....s#...%.o$.....o%...&*...0..A..........(....~.......o"...,)..o&..., .o'...-.~.....o(
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25984
                                                                                                                                                                                                                            Entropy (8bit):6.291520154015514
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:1R973o62/KqcAnb05J3w0I5eUGef8s72XBWdvVW2JW8aJcyHRN7WEimpplex:1RZ4nNxnYTb6Blha
                                                                                                                                                                                                                            MD5:E1E9D7D46E5CD9525C5927DC98D9ECC7
                                                                                                                                                                                                                            SHA1:2242627282F9E07E37B274EA36FAC2D3CD9C9110
                                                                                                                                                                                                                            SHA-256:4F81FFD0DC7204DB75AFC35EA4291769B07C440592F28894260EEA76626A23C6
                                                                                                                                                                                                                            SHA-512:DA7AB8C0100E7D074F0E680B28D241940733860DFBDC5B8C78428B76E807F27E44D1C5EC95EE80C0B5098E8C5D5DA4D48BCE86800164F9734A05035220C3FF11
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....jM^.........." ..0..8...........V... ...`....... ....................................@..................................V..O....`...............B...#..........PU............................................... ............... ..H............text....6... ...8.................. ..`.rsrc........`.......:..............@..@.reloc...............@..............@..B.................V......H........0...$...................T........................................(....*..(....z..(....z2.(....s....*2.(....s....*:........o....*.~....*~.-..(......}......}......}....*~.-..(......}......}......}....*Z..}......}......}....*J.{....%-.&.*o....*^.u....,........(....*.*~.{.....{....3..{.....{......*.*&...(....*2...(.......*....0..'........{......,..u....%-.&..(...+(....*(....*n.{....,..(....s....*.q....*..0..a.........{....o0.....,;..{....o2...(......;...3.~.......s......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):30888
                                                                                                                                                                                                                            Entropy (8bit):6.550270680442998
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:RzfFYXOvijvSGpUprWHEvgr0KnB4C7GrhIYiRSk0FP27NBY3Yuv+U:RxyOg9bxr9qaGKYi8K/Y/+U
                                                                                                                                                                                                                            MD5:96D7E9527C5D8BDBA798F72B5FD9B94A
                                                                                                                                                                                                                            SHA1:C9CE9813C74493084D6E3DDA37C35C8822CA381F
                                                                                                                                                                                                                            SHA-256:6942DC9FDBB229D066BA3E1844883B9DA3EAE21F7035FFF2674C3F19C6331B55
                                                                                                                                                                                                                            SHA-512:BE88433F513C4D9F58BDDFED57427DEC12BA0490E2D7C79176144732FBB7969956FA55B03E462C50EA3508389B3C29BC5A559F4B6002C6022C93D059C65B5C44
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...f6............" ..0..F...........e... ........... ....................................`..................................e..O....................N...*...........d..8............................................ ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B................be......H.......\4..$0............................................................(....*..{....*"..}....*..{....*"..}....*V.(......(......(....*.0..7.........(....}.......}.......}......|......(...+..|....(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(......(......(......(.......(....*.0..?.........(....}3......}4......}5......}2.....|3.....(...+..|3...(....*..0..7.........(....}#......}$......}".....|#.....(...+..|#...(....*..0..?.........(....}.......}
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.623350319992477
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:21Vrp7wobZBVBhB3GmLiVWgktWe9JHEDIYirwt0FP27NBY3Yuv+1WyT1g:21VV7TbXX72MtWQJHEsYi/K/Y/+1Wy5g
                                                                                                                                                                                                                            MD5:D92BF2C8E0A192E18B1F0B24CCB75171
                                                                                                                                                                                                                            SHA1:2A6343C3409172E1D426B763151E0CBA3B35E473
                                                                                                                                                                                                                            SHA-256:BEED084878EACA4A745A53CC21FAAD1A76F4F82C955BB507496B5B9F23032F1C
                                                                                                                                                                                                                            SHA-512:71AD4963BCEBE516FD9EE526F2DD1ECB13F10E1424D0D3CED08A19A38D902DA562C9B1D0E308C4B898E30187773F040CF6A437210EFEF52B957623F798E59459
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R.s..........." ..0..2..........:Q... ...`....... ..............................I/....`..................................P..O....`...............:...*..........,P..8............................................ ............... ..H............text...@1... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................Q......H.......`(...'...........................................................0..M........r...p}.....r...p}.....(......{..... (....(....(......{..... (....(....(....*^~....-.s.........~....*..{....*"..}....*..{....*"..}....*..0..8........(........(.....(.....o....r...p(....o.......&..r...p*.*........--.......0..(.......(.....o........(.....(.......&..r...p*.*.................0..X........o.....[.&......+9...Z.o.... ....(........Z.X.o.... ....(......b`.......X...o.....[2..*.0..V...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):2059432
                                                                                                                                                                                                                            Entropy (8bit):7.651137710710665
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:+3zNmj7tPN/PPINv2lYnvqfI1L3ciKKqjnTVlKJ+hgyiTebWmDXQHMkgXvYOdSYB:84vtPNvCv2Qqfobuvq+hqCTDgHMT
                                                                                                                                                                                                                            MD5:01CF6EF766C41BB2C99A2CCCDECC69C1
                                                                                                                                                                                                                            SHA1:8DD5EB983C1C8F2E3A2538E50295644BB778A69E
                                                                                                                                                                                                                            SHA-256:9A9B95CA40D32FA23A615A122FA3AAF7AEB32FBEF2850D729F77C1169FFC0452
                                                                                                                                                                                                                            SHA-512:9EE4D4D7852555F67CF0C9B372DCA87EC0727AB0A6FC5EAE309CF6BF5467FC75C6868A5E528D34AB605CDC736D30684D35A1451D4ABE3B99BA37D276474AC940
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G............"...0......D........... ... ....@.. ...............................P ...`.................................^...O.... ...A...........B...*..............8............................................ ............... ..H............text........ ...................... ..`.rsrc....A... ...B..................@..@.reloc...............@..............@..B........................H.......DD..T`......-....... v...........................................0..O.......s....%.o....%.o ...%.o!...%..o".....o#........($........(%..._,...o&...(....*.*..(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*...(.......(....(.......(....(.......(....(.....*.0..5........('...-..*.((.....o)...(*...(+...(,.......,..o-.....*............)........(....*2.(/...o0...*..(1...*.(2...*2.(....o3...*..(....o4...&.(.....o5....(.....o5....(....o6...&*2.(....o7
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):108200
                                                                                                                                                                                                                            Entropy (8bit):7.332504567097915
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Gn5VJM3T5szyxa9PuIKb8wmtyYVzH0cfNbQSi/GoP4YNjZ34A7GZK/ZIVQ:GWsEa9GIdyAUKWeYNl34AwK/ZV
                                                                                                                                                                                                                            MD5:261A5044C94F318DEEA20D178ED9F36E
                                                                                                                                                                                                                            SHA1:2A9704F70A543EE219481A3AA756A0CF151E1999
                                                                                                                                                                                                                            SHA-256:D17E9B0C62C224D1BA56E7206D8A44FE382FE99752C511BA211A7725D83FEF43
                                                                                                                                                                                                                            SHA-512:E53C320DBF6B2AAEEC01FE5AFF1FAD5A8D75B2483A78BA0E1B510F2A7A8C5C510ACD603541734F4A002748D0781FC11AFBF6967EBCDB41A6FC9A29C828ABC2A3
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l.g..........." ..0..p.............. ........... ....................................`.....................................O....................|...*..............p............................................ ............... ..H............text....n... ...p.................. ..`.rsrc................r..............@..@.reloc...............z..............@..B........................H........O..|w..................,.......................................V!.)1......s.........*...0..$........u......,...o....*.u......,...o....*.0..&........u......,....o ...*.u......,....o!...*...0..&........u......,....o"...*.u......,....o#...*B.(Y...-.(....*.*..{!...*"..}!...*>.{....o.......*.0..9........(*.....($.....(......,..o%...-..,..o&...-..,..o%...*.*.*....0...........s'...}.....((....(....-..s....+.(....}......{....o....(....}.....(!....{...........s)...o.....{....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):159368
                                                                                                                                                                                                                            Entropy (8bit):6.32384599449582
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:OcqXDYZbIkCKezJaoCNVljUmcmAs6Jm4AFt2iPaTatnhrOKK/E:9qbKwcB4njeXBSTcpOT/E
                                                                                                                                                                                                                            MD5:7AE17C855F3CC63174E90EA527B6138B
                                                                                                                                                                                                                            SHA1:0FE1E1B2252511F33EDA3FFCF1F8FC8586AB040A
                                                                                                                                                                                                                            SHA-256:26FF04208EC4D26EF4DDD9B3CF01C4D2A1544550BCD59EFDE6F30170053A1170
                                                                                                                                                                                                                            SHA-512:453BA41332A704F491FC9E1EE5FBE9F883EDDB4C26A71D207C93992726E9C5B7FEDC48EEEE2A2087F64B083F9473EE794FB2C8F3B77C9DBCBBC47B67816BD156
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..............Y.......................................................................Rich....................PE..L.....[...........!.........................................................`..................................................P.... ..`............@.......0..(...0...............................0...@............................................text....w.......................... ..`.rdata...A.......P..................@..@.data....6....... ..................@....rsrc...`.... ......................@..@.reloc..2(...0...0..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):70824
                                                                                                                                                                                                                            Entropy (8bit):6.23750269831583
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:rMDv5NwVvDK0HBDk4rVHe061i/kObvmaLLJBr+tTe7TK/SB0:UorK0HBDk4rV21HObvm2LJB4eHK/SO
                                                                                                                                                                                                                            MD5:0F7D6DEE75C3FBB958529AB6A351CBDF
                                                                                                                                                                                                                            SHA1:1CA639AB692ECD972C51C8BF826BF9BF089359FE
                                                                                                                                                                                                                            SHA-256:C5B07CBACD0FF045485A0A4CE6FB3CCB330A0623E3EFE347D61DA4E698FDE412
                                                                                                                                                                                                                            SHA-512:58F0B5ED44E3290D6C9FB0E624F2A351CD5BB4744A84AC55AC47FB1B087026DE4DBAA6BBC83255EEC51A2BB3ED9A680EF53E8FC7035586B4A74CA68016AE0F5D
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... F..........." ..0.............J.... ... ....... .......................`...........`.....................................O.... ...................*...@......D...8............................................ ............... ..H............text...P.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................,.......H.......0<................................................................("...*^.("......I...%...}....*:.(".....}....*b.{....%-.&*..s#...o$...*.0..)........{.........(%...t......|......(...+...3.*....0..)........{.........('...t......|......(...+...3.*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*2.(....s)...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..((...*..{....*"..}....*..{
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):18088
                                                                                                                                                                                                                            Entropy (8bit):6.784018634948529
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:4iqjQN+Pw2X6VUYNVYuKAiIYiUOX0FP27NBY3Yuv+WO:fqjQ8f5uKAvYidgK/Y/+X
                                                                                                                                                                                                                            MD5:CD6CB12E677F6C45BBFE57DED6C90567
                                                                                                                                                                                                                            SHA1:C13525F597974BA46B4B2A71F270B1056332F77B
                                                                                                                                                                                                                            SHA-256:FA0E1B932B5548F39795B9C24106B48D6221600EA7679D6A1D1DEEED1C8D7D8C
                                                                                                                                                                                                                            SHA-512:6D9DC73035F3C053281C9347131C8EF232797507F28271B60428FCA4A82CC43689BF1FA3E6DCE46AE92BC3C0E924745F81E315D2E4D4BD2F5D7991DC78A58FBD
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X4y..........." ..0.............n3... ...@....... ....................................`..................................3..O....@..H................*...`.......2..8............................................ ............... ..H............text...t.... ...................... ..`.rsrc...H....@......................@..@.reloc.......`......................@..B................N3......H........#................................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..(........%-.&r...ps....z(.......(.....*.0..................,..rM..ps....z.(.........,...(....o.......(.......(.....s....o.........(....(......(....o......(....o........&..(.....r...ps....o........*..........tu.......0..B..........(....%-.&+.o.......*&..(.....(....%-.&.+.(......s....o........*.............*.....0..B..........(....%-.&+.o ......*&..(.....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):22696
                                                                                                                                                                                                                            Entropy (8bit):6.669675167195394
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:PICREYcfpyXOT9Z7a6WmYWXWIYiAh70FP27NBY3Yuv+9gfK:PIiE9QXM1xYioMK/Y/+9gi
                                                                                                                                                                                                                            MD5:657A48C8DA3DE14059498E383EBEF318
                                                                                                                                                                                                                            SHA1:ECCC9AB4E6804EB0581AC5BBD684B7DB5A13F028
                                                                                                                                                                                                                            SHA-256:201EC78B195DCE51330985026A8A4EC641F9ACE53429C5C2F5BB3F1CE7BEEC4A
                                                                                                                                                                                                                            SHA-512:C4F2410470BBEA5680958490B705C828254992441D27E5FB7837957583FDA8D639EA8D9EF00035DB63ABACF28C5E4560D642C1D19F144255908C44F5C37CE8DE
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....oY.........." ..0..$..........:C... ...`....... ....................................@..................................B..O....`...................*...........A............................................... ............... ..H............text...@#... ...$.................. ..`.rsrc........`.......&..............@..@.reloc...............,..............@..B.................C......H.......h'..p............?..X...0A......................................j~....%-.&(....s....%.....*..*...0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*2r...p.(....*......(....*..(....*R. ...(...+%-.&("...*^. ...(#....(...+&~ ...*.s%...*"..s&...*..('...*.*....0........................((
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):35496
                                                                                                                                                                                                                            Entropy (8bit):6.3704146545353355
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:yS78zRHlzbzaxUxU7y7y7y7S7CxUxU7y3K7yTyTTN77xNTOLSxY777DKoRREEK79:yS7DOOqf1RuhC5w78K/m
                                                                                                                                                                                                                            MD5:26592109F19A24EE91F039EBB40038C4
                                                                                                                                                                                                                            SHA1:C8846404EFEB44C6CBB242B4C107F7CCE865AD14
                                                                                                                                                                                                                            SHA-256:E3F74128991C128410498223D4185915528360AD3DA92CD01BC23B19D8C2C670
                                                                                                                                                                                                                            SHA-512:8B031C53F5529D50A80AE2A4803D7C34F9A71A54DA01A912D1DB4D77D9BC1F490AB634A32F2DF6009EB53A2E57CD21975F3E00AF111BFA8320DE550A17509CA1
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>............." ..0..X...........v... ........... ...............................S....`..................................v..O....................`...*...........v..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................v......H........3...B...........................................................0.................(n...........................s)...}................s%...}................s....}................s....}................s....}................s....} ...............s!...}!...............s....}"...............s....}#...............s=...}$...............s9...}%...............s5...}&...............sA...}'...............sE...}(...............s-...})...............s1...}*........(....(....(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):711952
                                                                                                                                                                                                                            Entropy (8bit):5.967185619483575
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
                                                                                                                                                                                                                            MD5:195FFB7167DB3219B217C4FD439EEDD6
                                                                                                                                                                                                                            SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
                                                                                                                                                                                                                            SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
                                                                                                                                                                                                                            SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):160936
                                                                                                                                                                                                                            Entropy (8bit):5.261187861382329
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:kgeojL/a7WvVHjizsw+Uu5MBBA4TigO8K/1:5jDzvVDizsQWMB1iR/1
                                                                                                                                                                                                                            MD5:F3F2EB62314A960AD5F60B61A8193CBD
                                                                                                                                                                                                                            SHA1:FD77AD6D9F96762CD7EE8D17454D9A7490FD8148
                                                                                                                                                                                                                            SHA-256:0F74E741958310B8E65E3B2393828998DB075EBF4C5B29045707948C65CB03CC
                                                                                                                                                                                                                            SHA-512:A62D09CF93E604AE0282F05842B607216533800F82ABF75E7D0FF1E9DED5F748B9E34D5E38170F1C837A0957D15FC4C6DF101FF2BE48D90C880807D0FB95D3E6
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.Z...........!.........,......n:... ...@....... ....................................@..................................:..S....@..8)...........J...*...........8............................................... ............... ..H............text...t.... ...................... ..`.rsrc...8)...@...*..................@..@.reloc...............H..............@..B................P:......H........#......................P ............................................y.....3....f........UE#.H.NDC..\3,.|7...1...=.w..n.w.P5.y.......p.._Z@B..h..#,._...p...|..qXV..6.......i[..2;.'`..=.;...~....*..0..T.......(..........(....(......r...pr...p(...........s..........,..(......T+...~....(....T.*.~....,.~....o..........~....,.~....(..........*.0..e.......s.......o....s......r5..p.o ....r?..p.o ....rQ..pry..po .....s!........~.....("...s#.....r...p($...&*....0..A.......
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):147848
                                                                                                                                                                                                                            Entropy (8bit):6.032707503792338
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:yiq8kuub1o2/5pds7tUMZNFxtPwVrHlGZ6U1SiWUwBpXtNpTE1MNniv:WFwzFQ9FGZ1SityhtNpTECU
                                                                                                                                                                                                                            MD5:B6DB385295FA78A6AABCF217FD3C3F83
                                                                                                                                                                                                                            SHA1:71E2A93223A6B8204EED6B9834284C0FA1D7EBD0
                                                                                                                                                                                                                            SHA-256:ABF40F07643E6D29D0817021991F9D27410B7DCAEF80980D849634ACEF255BDC
                                                                                                                                                                                                                            SHA-512:122FDB77C0AC6A7A2ECF5519BB059097EF119390E6D3C34F9FAB303D60279EE8649175617E3B6FC2A3D118B422CE8BC1BFFC208332D0A9F012271325AC0A0EE7
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....@..........." ..0..............1... ...@....... ..............................0b....`.................................71..O....@...................'...`.......0..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................k1......H.......8...d].................../.......................................0..s........r...p(......(....,.r...psK...z.rW..po....-.r[..pro..p(X....*s.....~.....o....o......+8..o....t.........o.....o ...o!.....o.....o ...o!...o".....o#...-.....u........,...o$.....r...po%...,.r[..pr...p(X....*.rS..po%...,.r[..prg..p(X....*~&....~&......o%...,.....o'...&..o%...,.....o'...&.(....,..(....,.r...p.r...p((...sK...z.(....-&.(....-.r...p.r%..p((.....r)..p.((.....*.......U.E........(....*.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):53624
                                                                                                                                                                                                                            Entropy (8bit):6.18841715621451
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:mLtojuUUUbf/l0lwELEEEqi8g15qTLT5HGoV0weeezxSoL3G7Yl9zndG:mE17Iw8/i8gM5maee8SoL13zdG
                                                                                                                                                                                                                            MD5:B7ABAF6A90E95E585E71C0C22D90AF73
                                                                                                                                                                                                                            SHA1:C9756883D1738A9931D0BF58D6F69CBB8DFD5870
                                                                                                                                                                                                                            SHA-256:3BA247FDCC6953B5CC672A361983B7B0AF3051A83128970BCEBAB22036D1E859
                                                                                                                                                                                                                            SHA-512:3A67EF230A06FAE3095926EAD9AAF329009BC0F2ED6AA1E6683C426ADA29DDD9CB77EC3BE134DFC4CD10A1F675D518FB4986363C4FE649D4247770B96DBC7A56
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#2..........." ..0.................. ........... ...............................0....`.....................................O.......................x'..........t...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........E...w..........................................................&...(....*2.r...p(....*V.(......}......}....*..{....*..{....*..{....*..(......}......}......}.......}.......}....*..{....*..{....*..{....*..{....*..{....*...0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...+...3.*..0..'.......~.........(....t............(...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):301224
                                                                                                                                                                                                                            Entropy (8bit):5.823114295644
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:I856+Aq4WBT5TjbyfQ5d2ap3BES3l+3p7z8p5+cyIqrKMjE3g2AJX5ex4uyj0bOa:v56+Aq4WBTWpSqXhpeEioU2Uh/b
                                                                                                                                                                                                                            MD5:4798226EE22C513302EE57D3AA94398B
                                                                                                                                                                                                                            SHA1:F42C6CFA4068263D955608DE47E60D099AD8B394
                                                                                                                                                                                                                            SHA-256:38F32C75433A2AF902D33511BC3BBBE5BBF66D87FEC7D3AD1694AECEEB7E485E
                                                                                                                                                                                                                            SHA-512:94BB5E38CBCDC1E40BBD3AB14A3C92C8C90F64EA1910108BB2DE80E00BEA358A13A063031B5E3417A55102DB238488F5C3E766A1AF3ACEDB8806FEC5DD81990C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........._.Y.1.Y.1.Y.1..l.[.1...>.].1.[.5.[.1.9.|.X.1...l.D.1.Y.0.p.1...n.V.1...Q.M.1...o.X.1...k.X.1.RichY.1.........PE..L...[..@.................J...................`...............................P................... ...........................=..T....@...............n...*..............................................@............................................text....I.......J.................. ..`.data...L....`.......N..............@....rsrc........@.......^..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25768
                                                                                                                                                                                                                            Entropy (8bit):6.8288213942048985
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:tNjMaZomdl7FUC9mhsCVoNycrjIg9J197j26QIYidYFl0FP27NBY3Yuv+tiV:tHhShzuD/Bpa65YiGFuK/Y/+tiV
                                                                                                                                                                                                                            MD5:37E6E1D07988932C4360D74A34B27AE9
                                                                                                                                                                                                                            SHA1:F53AE2462ECC565EFCC28D1C5BB2C285BF899798
                                                                                                                                                                                                                            SHA-256:7E321840FA4F112D0F117D8F4E4DDCA274829693CD1C1189CE1061B6F67550FF
                                                                                                                                                                                                                            SHA-512:EFB94F19A885D20BF602AFE84CDD4FE5E9CE89B3A5B7D0BD5273546A6B5D894AD6F1359545DC6B2EEDE06FCB06790286CB69EFB153F249D7D8EF0C677C5D1B3A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.a.pi.Hpi.Hpi.H68.Hri.H68.H|i.H68.Hri.H68.Hti.H...Hqi.H...Hyi.Hpi.HFi.H};.Hsi.H};.Hqi.H};.Hqi.H};.Hqi.HRichpi.H........PE..L....q.Z...........!.................$.......0...............................p............@..........................7......D:.......P...............:...*...`..x...................................p4..@............0...............................text............................... ..`.rdata.......0......."..............@..@.data...\....@.......2..............@....rsrc........P.......4..............@..@.reloc..x....`.......6..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):124072
                                                                                                                                                                                                                            Entropy (8bit):6.169344446608534
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:LurAkSCDvkOtt+niUnQY8/LFEMnK8VQW5K/7:LJkSCDv+iUnQXLFEEM/7
                                                                                                                                                                                                                            MD5:2DC3102392DAEF9B935CDF4939A9B132
                                                                                                                                                                                                                            SHA1:F56261CE19BFC14F8317C2AA05F010E9ACFBCE02
                                                                                                                                                                                                                            SHA-256:B6D9088505C220F23132D78675004BC31E0FB5C04257357C2B02072EF8C28DAD
                                                                                                                                                                                                                            SHA-512:596AFAA1347CF730D2D0312857366EE3AD4C5C439E2F93BD6D38B29129C7B3530523B206FAEEF1DB3F6D9A18482162FF56321C9F1A1FA4F296F6B29AE8659321
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q............" ..0.................. ........... ....................... ......Q.....`.....................................O........................*..............8............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......d................................................................0...........s....%r...pr...po....%rk..pru..po....%r...pr...po....}......(....(...+o.....(...+o.......o....r!..p.o....(....}......o....}......o....}......o....}.....(....r%..p( ...-..(....re..p( ...,...}....*..}....*..{....*..{....*..{....*..{....*..{....*J.......s!...s:...*.~....%-.&~..........s!...%.....s:...*J.......s"...s#...*J.......s!...s:...*..0..........(...+o$.....E........9...^...*.r...pr...pr..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):116872
                                                                                                                                                                                                                            Entropy (8bit):6.726218253535254
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:8tw0r3S8FpUCSBCLiXdb0NphY3kWlon6ZhPn8agN6K/p:8mWi8FpCBCLybQakA/Pn8agNj/p
                                                                                                                                                                                                                            MD5:B9F4D43230B7FB66B95AF05DC03B32DE
                                                                                                                                                                                                                            SHA1:56F868C56FFF836CA61055499988F965DCA37D26
                                                                                                                                                                                                                            SHA-256:A103634B16841E3A68DD4A6BCBDFC3A1651B8C9F1114D99BF01CA31297664E21
                                                                                                                                                                                                                            SHA-512:50EB5DE7D0A1B5D7E1AC38209488635EF77733C2C78DC39D0D473904128DBFC67D4E3EC388D2C2D79645AFDF03FD1965386F6E6D21553C9A6DAB07A58549FD1E
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V.n.7.=.7.=.7.=.S.<.7.=.S.<o7.=.S.<.7.=._.<.7.=._.<.7.=._.<.7.=.S.<.7.=.7.=.7.=._.<.7.=._.<.7.=._3=.7.=._.<.7.=Rich.7.=........................PE..L...q._]...........!................O........0............................................@.............................T.......<.......................................p...............................@............0...............................text............................... ..`.rdata..4g...0...h..................@..@.data...4...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):49320
                                                                                                                                                                                                                            Entropy (8bit):6.325351798150663
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:Qmbo2ICFobV6wsLIcUIh/61jCouvi1Ys7ZYiG6K/Y/+Z:QmbrbU6ws0cGjCoei1Ys7Z7G6K/P
                                                                                                                                                                                                                            MD5:C22900453EF4B917460ADEA7DE87225B
                                                                                                                                                                                                                            SHA1:6878237656DA68C046FB95FAA8CAF3B4C719851B
                                                                                                                                                                                                                            SHA-256:9AF8C8105093B7D62FC578DAE3497FF0AD796C9ABD638EB14269DED4270DFF96
                                                                                                                                                                                                                            SHA-512:2E7D0EB99E2924FB375AAF8891968228193C65C133E362F66567C044E8B744ABC3A992EF7606644690D1BB81AD13A64A35D8107BDBDD9D5942BEA1DD1074EA3C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0................. ........... ....................................`.................................p...O.......,................*..............T............................................ ............... ..H............text....... ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........L...\............................................................{"...*..{#...*V.($.....}".....}#...*...0..A........u........4.,/(%....{"....{"...o&...,.('....{#....{#...o(...*.*.*. ?Y.. )UU.Z(%....{"...o)...X )UU.Z('....{#...o*...X*...0..b........r...p......%..{"......%q.........-.&.+.......o+....%..{#......%q.........-.&.+.......o+....(,...*..{-...*..{....*V.($.....}-.....}....*.0..A........u........4.,/(%....{-....{-...o&...,.('....{.....{....o(...*.*.*. (... )UU.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):31912
                                                                                                                                                                                                                            Entropy (8bit):6.377831305172757
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:i4sSUSsK/Py54Iu67VMam4AX10KIUt0kYcT/EDYZGSPeyc8cHIlkLi7FIYihZM09:izNK/G4IfVswkYLy5L7yYihrK/Y/+mT
                                                                                                                                                                                                                            MD5:CE66CBCDA6D3B5047691C4AFF63CFE79
                                                                                                                                                                                                                            SHA1:358E3A2284798BE1C537756A41721B61643D2BEE
                                                                                                                                                                                                                            SHA-256:B8551ECBE96BB718BAA56E053589A7F16561BFDAB86575441EC5FBE528B32B8C
                                                                                                                                                                                                                            SHA-512:7BC26EDD1C018553B163B75250B5862D26B607C26BDBFB6934F0AC5CE20B04D1956EEAF3915CBCE2129CD992ECA6E1B1C311991427D485CB43969A05431270E4
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r.C..........." ..0..J..........~h... ........... ..............................wt....`.................................*h..O....................R...*...........g..8............................................ ............... ..H............text....H... ...J.................. ..`.rsrc................L..............@..@.reloc...............P..............@..B................^h......H........1...5............................................................{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*&..(.....*...0...........s.......o.....+X..(.........(....o....o....&..(.........,!..r...po....&...(....o....o....&..r...po....&...(....-...........o ......o....o!.....+...*...........et.......0...........s"...%r...p.o#....%r...pr#..po#....%r+..prA..po#....%r]..p.($...o%...o#....%ro..p.($...o&............o....o'...o#....%r...p.($...o(....
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):25976
                                                                                                                                                                                                                            Entropy (8bit):6.331152456306087
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:Z90ljCvGQJ+GlfmER/asDZ0WN1L4meT6pmOW2ZZWeQMWMLHRN7S37EHR9zCt+:Z9EIGk+GlfmERxcFz2ZSCL+7Ex9zS+
                                                                                                                                                                                                                            MD5:3C5DFBB4E3F1AD153EB2E203B56EA0AE
                                                                                                                                                                                                                            SHA1:59623BF1D67D87264C165E421F12426DA998AF46
                                                                                                                                                                                                                            SHA-256:9E8252429D0E6529B87A2C79A13119F4DF56ABE924949F3750B024C51D747378
                                                                                                                                                                                                                            SHA-512:94DF20E98A2E5D7AC93B63EFEBCE4DAAFBF25AB6B4A2B76AF0BB46D9EDE102AC8C8E1147D5813CDB879AADD5A8AA4073FD0E6066286AF4EF4D368FAB983BE3B5
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....w............" ..0..4...........S... ...`....... ....................................`..................................S..O....`...............>..x'..........XR..T............................................ ............... ..H............text....3... ...4.................. ..`.rsrc........`.......6..............@..@.reloc...............<..............@..B.................S......H.......l,..l%...................Q........................................(....*.0..H.........~....,...~....*~..........(......~....%-.&s....%...........,..(......*........#<.......0..%.......~..........(...............,..(.....*....................0..........~..........(....(....o....(...+....,..(......*...........".......0..0.......~..........(....(.....o.....(...+....,..(......*.........$.......0..).......~..........(....(......o.......,..(.....*....................0..b...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):354984
                                                                                                                                                                                                                            Entropy (8bit):6.846739611307464
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:jbz6pzdD/rIJXiQTutgCNktQFvmnoxXTS4ubCjrKglegtKop/4:G9FrIJJaqCNktA+SXfUCP9lvtKop/4
                                                                                                                                                                                                                            MD5:D822226C4B35A7305269C8E16E542D3E
                                                                                                                                                                                                                            SHA1:12F92D16608AAC1C39DDC92BA2B5AB8B5AAE6C30
                                                                                                                                                                                                                            SHA-256:FC504A3F68150AFC8C3304E5528867BF99EDDE0F3707406A30371062DDD86A0E
                                                                                                                                                                                                                            SHA-512:3A3A18D96716BD1033C35B06B73674FF6CBBEBE8F5025D0BE260F649FB268745290139B6501B9E208EB43EC5D76C2ABBA0A34C1E2F7E0E9F25E14C41F54E3914
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....I}f.........."...0......D......6.... ... ....@.. ..............................o.....`.....................................O.... ..tA...........@...*........................................................... ............... ..H............text...<.... ...................... ..`.rsrc...tA... ...B..................@..@.reloc...............>..............@..B........................H........'... ...........G...............................................~....*.......*..,!.(...+.1..(...+(....-..(...+(....s....%o....%.o....o....&*....0..5........r...p.s....(.....{....,.*..}....r!..p.s.......(....*"..}....*..(....*.rY..p.....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*...0............j(......j(.....(....,#.(....o....,..(....o ....(....o!.....(......&...s"...(.....(
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):61608
                                                                                                                                                                                                                            Entropy (8bit):6.287396747644481
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:SmOGveifSTtyXEQ3nPGLb4PFvSMJCD2j+/IfHq1wJd9P581Icm/DskdFPYi3K/Ye:yLTtyXEQ3+bO6U+QlrPi1QLsgFP73K/h
                                                                                                                                                                                                                            MD5:A760AEACBE049C8C0D5DD66DD9EAA7A0
                                                                                                                                                                                                                            SHA1:975896722F2D5A365621EE407ACE3E3294CFC1C3
                                                                                                                                                                                                                            SHA-256:C3618538771839CBC6A855E41A1664D5B86313070FC75CA1B58EF74D007DBDE4
                                                                                                                                                                                                                            SHA-512:64CF42CF493686A4286320819D10A37CC075088509866E867A341651B7762FFD88750417E3AD72E6FA78908DD17C66363752E5AA2955066BA4930889D36AE3CA
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....b..........." ..0.................. ........... ....................... .......L....`.....................................O.......0................*..............T............................................ ............... ..H............text........ ...................... ..`.rsrc...0...........................@..@.reloc..............................@..B........................H.......@@..<...........|.................................................(....*..(....*..(....*.......*Z~....,.*.oB...&......*.......*b~....-.r...ps....z~....*.(#...o8...*.0..........(#......o9.....(....Q*6.(.....(%...*.0..........(#........o:.....(....Q*R.(.......(....('...*:(#......o?...*N.(.....(.....()...*2(#....o;...*2(#....o<...*..o....*..o....*2(#....o=...*2(#....o>...*6(#.....o....*...0..........s"......}"....{"...-...+....#...s.......(1...*6(#.....o....*6..(....(3..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3316968
                                                                                                                                                                                                                            Entropy (8bit):6.532906510598102
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:JIBbo0WIgmjljFtXCdRLRBcJd+KaGxHIkMNqzP56O8lZ7qXUqi9Y:6BbBWIgWljGxRB/LLY
                                                                                                                                                                                                                            MD5:0CF454B6ED4D9E46BC40306421E4B800
                                                                                                                                                                                                                            SHA1:9611AA929D35CBD86B87E40B628F60D5177D2411
                                                                                                                                                                                                                            SHA-256:E51721DC0647F4838B1ABC592BD95FD8CB924716E8A64F83D4B947821FA1FA42
                                                                                                                                                                                                                            SHA-512:85262F1BC67A89911640F59A759B476B30CA644BD1A1D9CD3213CC8AAE16D7CC6EA689815F19B146DB1D26F7A75772CEB48E71E27940E3686A83EB2CF7E46048
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....R............" ..0..r2..........&1.. ....2...... ........................2.....6Q3...@.................................G&1.O.....2..............|2.. ....2.....X.(.p............................................ ............... ..H............text....p2.. ...r2................. ..`.rsrc.........2......t2.............@..@.reloc........2......z2.............@..B................{&1.....H...........$....................(.....................................V!........s.........*.~....-*(....o....o....o.........~....-.~.........~....*..( ...*...0..G.......(!....o"....s.1....s*,..%..(.... ....o.....o 0...Zo....t....o8(..(....*..0..$..........(.....(....o.....(!.......io#...*z...(....(!....o"...o....(....*..0............T....r...p.(O....o$....(....*..0..I.......sG...sB)..s.(..s.(...(....s6(....,..o%....2...(....sV(....+.....%..ox...*..( ...*V.(&.....}......}..
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):110760
                                                                                                                                                                                                                            Entropy (8bit):5.479763068610726
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:hpKSyD3hoE3PQU9xb1iPKHKWU//6hE2rkQQc76rK/8:qSyLhZ/X9xb1YKqn/unQcOrK/8
                                                                                                                                                                                                                            MD5:3FC875FFEFAC2BBA64E6F2A6A7CFF45B
                                                                                                                                                                                                                            SHA1:CAB48D6D156261CD9612633D70A61DA670D0D093
                                                                                                                                                                                                                            SHA-256:5A12A8D3CA02716C616F56342C920422966ABF79B49C4B1E1C7FF36E97764E1B
                                                                                                                                                                                                                            SHA-512:DDA0B6F0587D7915B490FFA2225E72374A2AA671E2019ABDC72EB7598B642906CF09302575C5B5B495B832FF434D45BAD0650C0409358E5D1786F4561FAE3636
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....oY.........." ..0..v..........j.... ........... ....................................@.....................................O........................*..........t................................................ ............... ..H............text...pu... ...v.................. ..`.rsrc................x..............@..@.reloc..............................@..B................K.......H.......,S..0>..........\.................................................(....*&.l(....k*&.l(....k*..l.l(....k*&.l(....k*&.l(....k*&.l(....k*j~....%-.&(....s....%.....*..*.0..$.........(.....o.......&...,....o....,..*.*..................,!(....,..r...p.(....(....*..(....*.*.(....,.r...p......%...%...(....*..(....*.(....,.r...p......%...%...%...(....*...(....*.(....,!r...p......%...%...%...%...(....*....(....*2r...p.(....*2rG..p.(....*2r...p.(....*2r...p.(....*......(....*...
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):159368
                                                                                                                                                                                                                            Entropy (8bit):6.32384599449582
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:OcqXDYZbIkCKezJaoCNVljUmcmAs6Jm4AFt2iPaTatnhrOKK/E:9qbKwcB4njeXBSTcpOT/E
                                                                                                                                                                                                                            MD5:7AE17C855F3CC63174E90EA527B6138B
                                                                                                                                                                                                                            SHA1:0FE1E1B2252511F33EDA3FFCF1F8FC8586AB040A
                                                                                                                                                                                                                            SHA-256:26FF04208EC4D26EF4DDD9B3CF01C4D2A1544550BCD59EFDE6F30170053A1170
                                                                                                                                                                                                                            SHA-512:453BA41332A704F491FC9E1EE5FBE9F883EDDB4C26A71D207C93992726E9C5B7FEDC48EEEE2A2087F64B083F9473EE794FB2C8F3B77C9DBCBBC47B67816BD156
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..............Y.......................................................................Rich....................PE..L.....[...........!.........................................................`..................................................P.... ..`............@.......0..(...0...............................0...@............................................text....w.......................... ..`.rdata...A.......P..................@..@.data....6....... ..................@....rsrc...`.... ......................@..@.reloc..2(...0...0..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):301224
                                                                                                                                                                                                                            Entropy (8bit):5.823114295644
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3072:I856+Aq4WBT5TjbyfQ5d2ap3BES3l+3p7z8p5+cyIqrKMjE3g2AJX5ex4uyj0bOa:v56+Aq4WBTWpSqXhpeEioU2Uh/b
                                                                                                                                                                                                                            MD5:4798226EE22C513302EE57D3AA94398B
                                                                                                                                                                                                                            SHA1:F42C6CFA4068263D955608DE47E60D099AD8B394
                                                                                                                                                                                                                            SHA-256:38F32C75433A2AF902D33511BC3BBBE5BBF66D87FEC7D3AD1694AECEEB7E485E
                                                                                                                                                                                                                            SHA-512:94BB5E38CBCDC1E40BBD3AB14A3C92C8C90F64EA1910108BB2DE80E00BEA358A13A063031B5E3417A55102DB238488F5C3E766A1AF3ACEDB8806FEC5DD81990C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........._.Y.1.Y.1.Y.1..l.[.1...>.].1.[.5.[.1.9.|.X.1...l.D.1.Y.0.p.1...n.V.1...Q.M.1...o.X.1...k.X.1.RichY.1.........PE..L...[..@.................J...................`...............................P................... ...........................=..T....@...............n...*..............................................@............................................text....I.......J.................. ..`.data...L....`.......N..............@....rsrc........@.......^..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:InnoSetup Log 64-bit FastestVPN, version 0x418, 28615 bytes, 899552\37\user\37, C:\Program Files\FastestVPN\376\377\377\00
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):28615
                                                                                                                                                                                                                            Entropy (8bit):3.445479985432549
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:4BghCardZ7epOa8A9fINlxeiyMzW1VSgOf2KGPUO6a7r00Ho:QAbexDwQ300Ho
                                                                                                                                                                                                                            MD5:2A68FB84D2B0B759111726E909628BB6
                                                                                                                                                                                                                            SHA1:3E83684E2295E1B6D8EB62F3F26193D5F078D32A
                                                                                                                                                                                                                            SHA-256:4970FE9212F672E058F280FE5F76616A52BE20F15AB7233238F0F063498F465F
                                                                                                                                                                                                                            SHA-512:76AFA1F4E2E0E52DD9F954E6A463999A56F11BEDDE6BC2E6620DD5CEF30C3F17B379BD7851A3C9D562C1D79F5A946620FEAB303FAA9D4E24FE1B688B7322B69B
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:Inno Setup Uninstall Log (b) 64-bit.............................FastestVPN......................................................................................................................FastestVPN...............................................................................................................................o...................................................................................................................2..........e.@......s........8.9.9.5.5.2......a.l.f.o.n.s......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N....................B.. ........................C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N......C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.t.a.r.t. .M.e.n.u.\.P.r.o.g.r.a.m.s.\.F.a.s.t.e.s.t.V.P.N......F.a.s.t.e.s.t.V.P.N......e.n........................."...<........C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.................C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.B.o.u.n.
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3070013
                                                                                                                                                                                                                            Entropy (8bit):6.39701754184779
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:BdJYVM+9JtzZWnoS2VC23aun8+f5KuGP+VYNCWNtdH333t7:HJYVM+LtVt3P/KuGP+VYNCuf333V
                                                                                                                                                                                                                            MD5:A2386053A831B1C65F9BB923F4F17A7B
                                                                                                                                                                                                                            SHA1:530BC9411C100138963776A527966EA98D2D1FD9
                                                                                                                                                                                                                            SHA-256:3AE0793AF74140734EC43A261FAD664E5871890F28F9CCC692B68B3D6E1A26E5
                                                                                                                                                                                                                            SHA-512:2E149D81B13101F9C38EE67396A92527AE5BFD8761D8187BAB635C7736B316E31D9A246DC14D934F28EEE4076F9B3FA78751F912D9CFEB6A032470997382D76F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....gf..................*...........*.......*...@..........................P/...........@......@...................P,.n.....,.j:....,.$....................................................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.rsrc...$.....,.......+.............@..@.............`0......./.............@..@........................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):4
                                                                                                                                                                                                                            Entropy (8bit):1.5
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:kS:kS
                                                                                                                                                                                                                            MD5:3499738F724B2AE08A1871B6A0A7D175
                                                                                                                                                                                                                            SHA1:A1AB9117DC426032D0E013BB62EDF31CD37B1CAF
                                                                                                                                                                                                                            SHA-256:715FCF6424D0AC2F19B5A65364795EBB982885F040E93A1BF4FDD594D9478251
                                                                                                                                                                                                                            SHA-512:3B1F29ADDCC165F7807149B13451ABE9DB7E0258F5A77F5802AEA11672B37CBC3439D4D8EB2AAB81F37B302B6631CD9573D64CF281FE4C9E44C672BF31BFF902
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:9030
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1310720
                                                                                                                                                                                                                            Entropy (8bit):0.8307233233252883
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDugn:gJjJGtpTq2yv1AuNZRY3diu8iBVqFR
                                                                                                                                                                                                                            MD5:6EB9B5542248F870E530EC41B4F54482
                                                                                                                                                                                                                            SHA1:FC24AD0BC4A023776A7FD75C3BB7275639968BAF
                                                                                                                                                                                                                            SHA-256:E7928EF6F04A084DAA066FA75D6E72985D5FFAF3EBDB9FA0D1D911BC56165F08
                                                                                                                                                                                                                            SHA-512:444B437463242DC6C159DAC43A6F85B6EBFE59AD68388F9FD9BB04CC06E4627A8852B500F55FB3CEB310CBC3A88C8F29B391931515365554C8C3082F2C452348
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:...M........@..@.-...{5..;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................4..........E.[.rXrX.#.........`h.................h.5.......3.....X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x61acafc9, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1310720
                                                                                                                                                                                                                            Entropy (8bit):0.6585799420806527
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:ZSB2ESB2SSjlK/rv5rO1T1B0CZSJRYkr3g16P92UPkLk+kAwI/0uzn10M1Dn/di6:Zaza9v5hYe92UOHDnAPZ4PZf9h/9h
                                                                                                                                                                                                                            MD5:72A621AA0214FBAA98F15E3F8686AB76
                                                                                                                                                                                                                            SHA1:19726C0C1AC3524503B1A406915DB07038FCA21B
                                                                                                                                                                                                                            SHA-256:A0881FDD94A3B4DBDD39258247E05EC73E9D9006AE34FA210987189D4FF39A83
                                                                                                                                                                                                                            SHA-512:570925ED006A47090DF669C304240AE8826D47D782FE28A51F8C44F6BFC516A6F6E40407B2ED5B200670AE1B19A99B6543EB3AFB1F3C472D42BE2C6B1F46A8BB
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:a...... ...............X\...;...{......................0.z..........{..*....|'.h.|.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........-...{5..............................................................................................................................................................................................2...{..................................^...*....|'....................s*....|'..........................#......h.|.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):16384
                                                                                                                                                                                                                            Entropy (8bit):0.07925452414577644
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:6bKYe4gZrAkGuAJkhvekl1wKUllAllrekGltll/SPj:6bKzZrbrxlOKU/AJe3l
                                                                                                                                                                                                                            MD5:8A496B36706A7DFF60D2E5E8EC42A211
                                                                                                                                                                                                                            SHA1:59A18B62319919A3D7C72A6EA64E18111637B417
                                                                                                                                                                                                                            SHA-256:28C937ED414882AA892AC6929C96B6893CE1A48F9A71804F970B2BD11CE1D3DE
                                                                                                                                                                                                                            SHA-512:437829232BF1CC2EDBB0492EADE9FD370D6B6DED9A2570CA68058770E0D92EC1554AAA6CE4A333942C037B058A2B5EB512BAE2C1B67DF1EF9EBA6330ADC4C73C
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:6........................................;...{..*....|'......{...............{.......{...XL......{.....................s*....|'.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 3 07:29:22 2024, mtime=Thu Oct 3 07:29:22 2024, atime=Thu Jun 27 19:18:16 2024, length=2059432, window=hide
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1765
                                                                                                                                                                                                                            Entropy (8bit):3.216936257744624
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:8UwMddv5O8IcQhpLAsVd/Z6d/nd/VkIbfd/VyRm:8Qddv5rTy8sVd/Z6d/nd/Vkcd/VO
                                                                                                                                                                                                                            MD5:D62BEC3DE822869312B5035AF27D9792
                                                                                                                                                                                                                            SHA1:2C417B4D0D274916E117711437DD2815C651A3C9
                                                                                                                                                                                                                            SHA-256:D85889F4C73D8A7B9D6B0B04E6046FC8A0A6ED12475B5B0895F120DB40A9DF79
                                                                                                                                                                                                                            SHA-512:831C65232E49E72D0EEAFE30CFD125F83008491758FCF158130835DF4EB74B9E7CB322909A8BE8BF6B9937A4A824447C166FE281EF36E6C7AAA3A29B961BCB72
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:L..................F.@.. .....%Yn...J.6Yn......$.....l...........................P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDW.r....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....CY.C..FASTES~1..F......CY.CCY.C....*.......................\.F.a.s.t.e.s.t.V.P.N.....j.2..l...XH. .FASTES~1.EXE..N......CY.CCY.C....J.........................F.a.s.t.e.s.t.V.P.N...e.x.e.......Y...............-.......X...........?..(.....C:\Program Files\FastestVPN\FastestVPN.exe..9.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.F.a.s.t.e.s.t.V.P.N...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.a.p.p.-.i.c.o.n...i.c.o.........%SystemDrive%\Program Files\FastestVPN\app-icon.ico.....................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 3 07:29:22 2024, mtime=Thu Oct 3 07:29:22 2024, atime=Thu Oct 3 07:28:57 2024, length=3070013, window=hide
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):885
                                                                                                                                                                                                                            Entropy (8bit):4.5337971926259355
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:8muG20YXNh9hC1+dpF4G/UWSKO8DSzyOjA0DRkbdpBo6bdpBgdV0KmV:8muA1+ddv5O8EyyAEwd/o+d/gd5m
                                                                                                                                                                                                                            MD5:F2DA94165ECB78B742AF597A98DCD46E
                                                                                                                                                                                                                            SHA1:4364541CC45EF6DD3ADDCBC7286C6F991512D6FB
                                                                                                                                                                                                                            SHA-256:A5B948A553CA82B40EBE1C87C688F854FF9159A58097E1C0E303DE17CEF2399C
                                                                                                                                                                                                                            SHA-512:B9B3DF047E20206923954D8A6B9EC8C11F35A567948E578454DD70A35E62D0CF7E8903AA7A1DCABB1925855395846CCC768F17D255707CD8C1D8AF87F6A660F6
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:L..................F.... ...6..Xn...F..Xn.....8Jn...=............................P.O. .:i.....+00.../C:\.....................1.....CY.C..PROGRA~1..t......O.ICY.C....B...............J.....t.&.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....CY.C..FASTES~1..F......CY.CCY.C....*.......................\.F.a.s.t.e.s.t.V.P.N.....f.2.=...CY.C .unins000.exe..J......CY.CCY.C............................e.u.n.i.n.s.0.0.0...e.x.e.......W...............-.......V...........?..(.....C:\Program Files\FastestVPN\unins000.exe..7.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.u.n.i.n.s.0.0.0...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.`.......X.......899552...........hT..CrF.f4... ...2=.b...,...W..hT..CrF.f4... ...2=.b...,...W..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):65536
                                                                                                                                                                                                                            Entropy (8bit):1.0633118697131008
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:2bWJvoNa0BU/6aGiJ6OIzuiF1Z24IO8u:cWJvoLBU/6at9IzuiF1Y4IO8u
                                                                                                                                                                                                                            MD5:1831D1719505D156068DF328653E3812
                                                                                                                                                                                                                            SHA1:46035F94C56D37068B2EB0C73F0667D85A52D5DB
                                                                                                                                                                                                                            SHA-256:C6057F10140FAECBD313E57B3695FF5E4CCD0F37C4C75BBC1F04963A18E4F91D
                                                                                                                                                                                                                            SHA-512:8ACA32B42836511557999B4BC38528A915218C09453A7320A2B8F70077CCEAC30923215FECD0FFFA70A02EF0F17A8A733FC5CADE64E171627F69C8E332343F89
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.1.7.7.7.6.6.7.0.2.0.9.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.1.7.7.7.7.1.8.5.8.1.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.e.4.7.9.9.b.-.2.1.5.4.-.4.6.1.e.-.9.6.1.0.-.7.e.7.f.e.d.8.0.b.7.b.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.3.6.b.7.3.b.-.1.b.7.f.-.4.d.8.a.-.8.a.a.9.-.7.c.1.b.a.6.5.d.7.4.e.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.a.s.t.e.s.t.V.P.N...W.i.n.d.o.w.s.S.e.r.v.i.c.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.F.a.s.t.e.s.t.V.P.N...W.i.n.d.o.w.s.S.e.r.v.i.c.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.8.4.-.0.0.0.1.-.0.0.1.4.-.b.3.a.b.-.8.a.6.0.6.e.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.3.7.5.a.5.b.0.1.c.c.e.6.9.2.0.b.8.4.1.1.a.f.c.e.d.8.6.5.7.1.0.0.0.0.0.0.0.0.0.!.0.0.0.0.a.b.1.8.
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):86280
                                                                                                                                                                                                                            Entropy (8bit):3.062017231829248
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Cp8p7Qcvgqpkl8hfqxvywZBnn+O+ovTvo+o+of+u+I+UqxZN:Cp8p7Qcvgqpkl8hfqxvywvnn+O+ovTvb
                                                                                                                                                                                                                            MD5:3A8FEFD0FE2E706B9000B33E6DDA645B
                                                                                                                                                                                                                            SHA1:FCABFF03142B0359D9333C0DBF6E38B51B8144F6
                                                                                                                                                                                                                            SHA-256:76B63ADD60B2980199F80FB71E6623D403131C5D000B9A9B5C821A6D744B6D7A
                                                                                                                                                                                                                            SHA-512:C0CA4E6682B7E5123783083C3EC8294C02E9CC0ECB09976EAE4B4B3191EC527336A4E7106801646E21A5092952F3A3F28EB16B4F70BB1B616CCF7000276D4CE1
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):13340
                                                                                                                                                                                                                            Entropy (8bit):2.685635882192288
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:TiZYWvuobdfY7Y3BWYFnHAQYEZvc8tCi3E3RqwbMDJaxRHqMoDNIQZ3:2ZDvPcwvgGcJKJaxhqMoDSQZ3
                                                                                                                                                                                                                            MD5:922F44AE69463763DE399434470C854B
                                                                                                                                                                                                                            SHA1:CB761FB76B576B2AAFF7F95C909ABED33D407299
                                                                                                                                                                                                                            SHA-256:7B351F30AB0C7F5A009808509ED70F425AD25F354D6C256BA1F3CEE5FBF24EF6
                                                                                                                                                                                                                            SHA-512:E848E16620B8DC6D0FD19193AF3CE106D9F63EC87F671402798788C0D30F848E5C486C7A0F89E6FAF57E30ED8FA7EEA6C64989F110D43DB79BB622339F536275
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 08:29:36 2024, 0x1205a4 type
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):223945
                                                                                                                                                                                                                            Entropy (8bit):4.069725931859541
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:p4P7Jxlg6WpN4uE2aOnLTgvFn8SVX91XAoAyICCDFMtTANbte+IhSTlHuBojRLXG:pP6g4uEqnLTgvF8y8yAF2se8TLLXR
                                                                                                                                                                                                                            MD5:405E73DB01802AFEE6FA146EE927B56F
                                                                                                                                                                                                                            SHA1:83604FFFBB6ED538BE4392A60FCD7C74B89C91D7
                                                                                                                                                                                                                            SHA-256:ED135640AFE928058451C6462C6F683AEBB7FB5CF120A4A9ECD82B47F4D4AC34
                                                                                                                                                                                                                            SHA-512:06C5A7BB2F48ACF598E2FA6912C63691523482EA569FEA19E7254A394A785BCE6BC3A2677B0D4D64B49C92766D882131FBA4421CB761128B6C135C908D9809AC
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:MDMP..a..... ........U.f....................................$............"...@..........`.......8...........T...........h*..a@......................................................................................................eJ......\ ......GenuineIntel............T............U.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):8486
                                                                                                                                                                                                                            Entropy (8bit):3.701081841590198
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:R6l7wVeJKR6p6Ybx6ZgmfZa0DynprU89bCysfPWm:R6lXJM6p6Yt6ZgmfEQuCxf3
                                                                                                                                                                                                                            MD5:97BA7E294E8183423AA44E7FE81B7BE6
                                                                                                                                                                                                                            SHA1:3F607692C027D2BE27826D074B2D694AF3159952
                                                                                                                                                                                                                            SHA-256:55B31D963C1D1FF5107C574EFBD70A91B8414E67FB68756F34D41EB16A9BC627
                                                                                                                                                                                                                            SHA-512:01EEFA09CEAE981911F4AEB662616066FFFC2EBCDAC24317F28E4D99DA08818E559E93E93ED5BBC3AACD2849684114A156FA4CFACB2C29020B90F9D1BCD092DC
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.7.6.<./.P.i.
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):4887
                                                                                                                                                                                                                            Entropy (8bit):4.554016226918778
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:cvIwWl8zseYJg77aI9BWWpW8VYiYm8M4JCA2tf8HcFmM+q8vV2tf8HQkgIjUPV2R:uIjf/I7n37VSJC1sCKMsQzUUPMjd
                                                                                                                                                                                                                            MD5:2B4A25A3A7554C8C0F82D47EF4C2597A
                                                                                                                                                                                                                            SHA1:C01BA283FE9B015E9AC5B271A8EE1CFD9B76AB05
                                                                                                                                                                                                                            SHA-256:0D54A969C3F8457BB01E937AD81A8EA38F8AFD8547ECC08F75B59DA9C5B01487
                                                                                                                                                                                                                            SHA-512:537DEEE9EDB49B737023BE535DFBEEB09396CC1B98954F186A084E5C98B305C6F8AB9C43B00EE11196B1D3A15E175FF8ABBD9268617A560A8822E6B93FA5064B
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="527012" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):85822
                                                                                                                                                                                                                            Entropy (8bit):3.067588532863177
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Se5Q+swVwuuNh9/eP0dalBMzpJ/+g+N5Bo34C:Se5Q+swVwuuNh9/eP0dalBMzX/+g+N5Y
                                                                                                                                                                                                                            MD5:08E145B08028AE617B056F5792467E61
                                                                                                                                                                                                                            SHA1:513026B8472A495FC06F237480A8DC37477F06AA
                                                                                                                                                                                                                            SHA-256:4D773FE4FE4BC1275819EFF9B44DD6AB4E316F339B971DDE5724F3F7974B6129
                                                                                                                                                                                                                            SHA-512:B67C390CF9A25C167893DCF0253F6FAB678228A695BBE3927FF3B97C724025E32E2451429B11CC2B01E131DAF78E1BEA0A8535F68698CE88AB2FE0ED67A9C349
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):13340
                                                                                                                                                                                                                            Entropy (8bit):2.685080143531309
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:TiZYW/kyRPk1oYMOYvW9iHlYEZthtFit3pvuvwrU/kapRHdDYM8YxEIaZ3:2ZD/kwDOQRW1aphWM8GzaZ3
                                                                                                                                                                                                                            MD5:F0B6AC4F0A8B052B0973A87218576813
                                                                                                                                                                                                                            SHA1:F36D6359C76B3F2C165CD5F3DF2FE3F839E17118
                                                                                                                                                                                                                            SHA-256:991D659A0136D1F87A99B0A7D8F93D397573660AC42A9318ADCE622E31B18ED5
                                                                                                                                                                                                                            SHA-512:788F6BDED512ED084EADB210397A0B34FA317CF93CC2B8F880BBC57272305F6A86BD03E5C1DA390CC37103DB60E9EB14B10F3C7D4C06A3AFF4CCEF17F62F24FB
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 3 07:29:22 2024, mtime=Thu Oct 3 07:29:27 2024, atime=Thu Jun 27 19:18:16 2024, length=2059432, window=hide
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1747
                                                                                                                                                                                                                            Entropy (8bit):3.213687677976615
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:8nh1+ddv5O8IcQhpLAsod/Z6d/nd/VkIbfd/VyRm:8h1+ddv5rTy8sod/Z6d/nd/Vkcd/VO
                                                                                                                                                                                                                            MD5:7B9C40A0A2EA989DD2D3185A6481996A
                                                                                                                                                                                                                            SHA1:29CA5AEC03EB674140C3637D2CDAB258EC6D469D
                                                                                                                                                                                                                            SHA-256:4D0C134D85317F890CB0122499745893090B44AF0567469BB18CE87CD1DB5B23
                                                                                                                                                                                                                            SHA-512:B6C5AE02F24D2FAFEF390562E1085C06E59DFA6D17A0F0D5EECF87BB6FDC987D350821777A9AE2906728959BDCCE8392F3AFBD1EF857248A6513780E1313831C
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:L..................F.@.. .....%Yn...W.(\n......$.....l...........................P.O. .:i.....+00.../C:\.....................1.....CY.C..PROGRA~1..t......O.ICY.C....B...............J.....t.&.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....CY.C..FASTES~1..F......CY.CCY.C....*.......................\.F.a.s.t.e.s.t.V.P.N.....j.2..l...XH. .FASTES~1.EXE..N......CY.CCY.C....J.........................F.a.s.t.e.s.t.V.P.N...e.x.e.......Y...............-.......X...........?..(.....C:\Program Files\FastestVPN\FastestVPN.exe..0.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.F.a.s.t.e.s.t.V.P.N...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.a.p.p.-.i.c.o.n...i.c.o.........%SystemDrive%\Program Files\FastestVPN\app-icon.ico.......................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:Certificate, Version=3
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1428
                                                                                                                                                                                                                            Entropy (8bit):7.688784034406474
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:nIGWnSIGWnSGc9VIyy0KuiUQ+7n0TCDZJCCAyuIqwmCFUZnPQ1LSdT:nIL7LJSRQ+QgAyuxwfynPQmR
                                                                                                                                                                                                                            MD5:78F2FCAA601F2FB4EBC937BA532E7549
                                                                                                                                                                                                                            SHA1:DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
                                                                                                                                                                                                                            SHA-256:552F7BDCF1A7AF9E6CE672017F4F12ABF77240C78E761AC203D1D9D20AC89988
                                                                                                                                                                                                                            SHA-512:BCAD73A7A5AFB7120549DD54BA1F15C551AE24C7181F008392065D1ED006E6FA4FA5A60538D52461B15A12F5292049E929CFFDE15CC400DEC9CDFCA0B36A68DD
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0...0..x..........W..!2.9...wu\0...*.H........0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G40...130801120000Z..380115120000Z0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G40.."0...*.H.............0..........sh..]J<0"0i3..%..!=..Y..).=X.v..{....0....8..V.m...y....._..<R.R....~...W.YUr.h.p..u.js2...D.......t;mq.-... .. .c)-..^N..!a.4...^.[......4@_.zf.w.H.fWW.TX..+.O.0.V..{]..O^.5.1..^......@.y.x...j.8.....7...}...>..p.U.A2...s*n..|!L....u]xf.:1D.3@...ZI...g.'..O9..X..$\F.d..i.v.v=Y]Bv...izH....f.t..K...c....:.=...E%...D.+~....am.3...K...}....!........p,A`..c.D..vb~.....d.3....C....w.....!..T)%.l..RQGt.&..Au.z._.?..A..[..P.1..r."..|Lu?c.!_. Qko....O..E_. ........~.&...i/..-............B0@0...U.......0....0...U...........0...U..........q]dL..g?....O0...*.H..............a.}.l.........dh.V.w.p...J...x\.._...)V.6I]Dc...f.#.=y.mk.T..<.C@..P.R..;...ik.
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):254
                                                                                                                                                                                                                            Entropy (8bit):3.0528988669712294
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:kKck3pLDcJgjcalgRAOAUSW0PTKDXMOXISKlUp:EMpLYS4tWOxSW0PAMsZp
                                                                                                                                                                                                                            MD5:AAF180209F27FCA2D15B95154EA77496
                                                                                                                                                                                                                            SHA1:6DE24E0A704B4037DCC6E42F9FEF97856C6CA359
                                                                                                                                                                                                                            SHA-256:E1066491B261DBB5F661A105983122C1795FCF3E6827D90283D2A6EEB914D044
                                                                                                                                                                                                                            SHA-512:C43F70984F36A57C5B518DB30E7B841E6AE485EED37AB7087636EE0F3B394FAEED8E680EC3D254B229544F0C59B0D37CBB0D16CFD37B1AC6120D932DD384323F
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:p...... ....l....).fn...(....................................................... ............n......................h.t.t.p.:././.c.a.c.e.r.t.s...d.i.g.i.c.e.r.t...c.o.m./.D.i.g.i.C.e.r.t.T.r.u.s.t.e.d.R.o.o.t.G.4...c.r.t...".5.a.2.8.6.4.1.7.-.5.9.4."...
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):393
                                                                                                                                                                                                                            Entropy (8bit):4.9531103888019015
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:TMHdGGpOiYX4t/rAFQD4t/rA0y4t/KDSMdu6kG3xT:2ddY4zrUzRyl3
                                                                                                                                                                                                                            MD5:862D30CA45F60177D808B23FE3CFE7E6
                                                                                                                                                                                                                            SHA1:59B3F505AAD38FAFAACE84CB3FFB33D995FD17AD
                                                                                                                                                                                                                            SHA-256:5507B15F1FDD939E600D213A2DD943CAB0B3516C46F379C871781A886337ACBF
                                                                                                                                                                                                                            SHA-512:138C588D5DD7930BEF6B08C0E9B56B9343EBA22557AE6ECB955C82C7DF16335681D020628E616BB2DCAE1A5EBC27C2FEC1C047C8385319CC55A7179EA17D6D6D
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="False" />.. <add key="AppCenterServiceEnabled_analytics" value="False" />.. <add key="AppCenterServiceEnabled_crashes" value="False" />.. <add key="AppCenterInstallId" value="77a89d64-944c-4744-b602-85ca0cedced7" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):166
                                                                                                                                                                                                                            Entropy (8bit):4.816940765206284
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:vFWWMNHU8LdgCQcIMOofqRqLVuXKCWAawLEHJq0Vq4tlKaF9ULVuuQIMOn:TMVBd1IGpOSDH40Vq4t/G3QIT
                                                                                                                                                                                                                            MD5:90401247D5A6AF2729E2F23FBA0A6351
                                                                                                                                                                                                                            SHA1:977D37740A245C9A41AD5B8916C07A699B181A09
                                                                                                                                                                                                                            SHA-256:C4622D6EF948D316ED1C28E5BD2EE8CCE28BE710E9815CA67BDFF4C2648AACA4
                                                                                                                                                                                                                            SHA-512:1F47BC3EFD2AB121663FF12F753DF519DE18CFDE43C79C475D7CEC32D70AFC7CE8A696EBCE5BA2519CBAA4F58FBEDDEC082B3AC6EFCE50996D54A2975B2C27DE
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="False" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):166
                                                                                                                                                                                                                            Entropy (8bit):4.816940765206284
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:vFWWMNHU8LdgCQcIMOofqRqLVuXKCWAawLEHJq0Vq4tlKaF9ULVuuQIMOn:TMVBd1IGpOSDH40Vq4t/G3QIT
                                                                                                                                                                                                                            MD5:90401247D5A6AF2729E2F23FBA0A6351
                                                                                                                                                                                                                            SHA1:977D37740A245C9A41AD5B8916C07A699B181A09
                                                                                                                                                                                                                            SHA-256:C4622D6EF948D316ED1C28E5BD2EE8CCE28BE710E9815CA67BDFF4C2648AACA4
                                                                                                                                                                                                                            SHA-512:1F47BC3EFD2AB121663FF12F753DF519DE18CFDE43C79C475D7CEC32D70AFC7CE8A696EBCE5BA2519CBAA4F58FBEDDEC082B3AC6EFCE50996D54A2975B2C27DE
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="False" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):390
                                                                                                                                                                                                                            Entropy (8bit):4.960433134947827
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:TMHdGGpOiYX/rAFQD/rA0y/KDSMdu6kG3xT:2ddYDrP7l3
                                                                                                                                                                                                                            MD5:0751F54FC0AC7BAC7D6E0C921C287C20
                                                                                                                                                                                                                            SHA1:A297A591D5761768C4819F6B832386B46AE14684
                                                                                                                                                                                                                            SHA-256:A15C2358AA5AB40DBD6C2B18E04A208EF85B4341131BAD8F015675EA042DC039
                                                                                                                                                                                                                            SHA-512:AD20AD3F55648113E456A8E0E0DFCAE386EBA98825607642186C75D62DC8779F4D77E172782F9D2971E1528BF8642DE8AD979DBAEE30F0499065631493CD3C3E
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="True" />.. <add key="AppCenterServiceEnabled_analytics" value="True" />.. <add key="AppCenterServiceEnabled_crashes" value="True" />.. <add key="AppCenterInstallId" value="77a89d64-944c-4744-b602-85ca0cedced7" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):391
                                                                                                                                                                                                                            Entropy (8bit):4.96667176035501
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:TMHdGGpOiYX/rAFQD/rA0y4t/KDSMdu6kG3xT:2ddYDrPRyl3
                                                                                                                                                                                                                            MD5:05764BF58382E1554DFC1299A59557C3
                                                                                                                                                                                                                            SHA1:EAE5A73A934180CAEE53E8382014449179D4E54F
                                                                                                                                                                                                                            SHA-256:34FF50B1AD68C1ED5C5A96924FC1948C11E63251D587B6AB7CE354DCBF4D3133
                                                                                                                                                                                                                            SHA-512:D9550BD6E92F60C2FDC86AD9F693056DD3560771421AA76F5D08727569E437E566AFE6C0FD1E1B1194DC26B5338B7890F3CFD9F36EC420DFBD2291E683041FC2
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="True" />.. <add key="AppCenterServiceEnabled_analytics" value="True" />.. <add key="AppCenterServiceEnabled_crashes" value="False" />.. <add key="AppCenterInstallId" value="77a89d64-944c-4744-b602-85ca0cedced7" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):237
                                                                                                                                                                                                                            Entropy (8bit):4.807606594598902
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:TMVBd1IGpOSDH40Vq4t/S4JAFQDuq4t/G3QIT:TMHdGGpOiYX4t/rAFQD4t/G3xT
                                                                                                                                                                                                                            MD5:183EBDEC24DDC45FF5E38C915A0F1F2E
                                                                                                                                                                                                                            SHA1:E1FFE9DA68D9F934FD66E0EB15857C9C1F9BC48D
                                                                                                                                                                                                                            SHA-256:6165A855053058DA8ABDE8798FABCD9F0E6ECAD175E52A3DFE0F3CF081C82E4E
                                                                                                                                                                                                                            SHA-512:41F7B750B6CE0B096A3D5FD7ECF6CD1E222C7B26C4FF3F0463B1AAB2D5718245CF4A91AB396B02ED8B125A55E62574D5E11949B95C5A636899CD1A2F4F795D06
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="False" />.. <add key="AppCenterServiceEnabled_analytics" value="False" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):392
                                                                                                                                                                                                                            Entropy (8bit):4.964207724341754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:TMHdGGpOiYX/rAFQD4t/rA0y4t/KDSMdu6kG3xT:2ddYDrUzRyl3
                                                                                                                                                                                                                            MD5:3131918A1622FC2C3819A09F49BEDA82
                                                                                                                                                                                                                            SHA1:CC11EBB2FE641823592E1E1F746714F9100B9056
                                                                                                                                                                                                                            SHA-256:369D5AEB72B80F379793552A46618CE16866226E07ADCCE06D12F74541028112
                                                                                                                                                                                                                            SHA-512:C30897D0A5D5AE51EBD260581F132B0A39814EB39578EBFAC7536B595EB5030831606992926F731C235ABE4E872864E741A22646E362F9BAEEE3D19B99A2EC79
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="True" />.. <add key="AppCenterServiceEnabled_analytics" value="False" />.. <add key="AppCenterServiceEnabled_crashes" value="False" />.. <add key="AppCenterInstallId" value="77a89d64-944c-4744-b602-85ca0cedced7" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):306
                                                                                                                                                                                                                            Entropy (8bit):4.786578375552194
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6:TMVBd1IGpOSDH40Vq4t/S4JAFQDuq4t/S4JAHUfq4t/G3QIT:TMHdGGpOiYX4t/rAFQD4t/rA0y4t/G3p
                                                                                                                                                                                                                            MD5:9BD7587F34E11ECFAD8B5DEEED8364B6
                                                                                                                                                                                                                            SHA1:93765EE7A4A27B2F84134001FAAB307984BD58BE
                                                                                                                                                                                                                            SHA-256:B9870C1A6239C96F710CEB8B8E21A745433A8C8151B0D2FD9C17A0D2C4AB1C29
                                                                                                                                                                                                                            SHA-512:7B0B26DFE2CD19BF210AE3E916D95D9EE97D6677C11979D2F8787C2EC9F682FC52078B4D126BC4671661CFD98EF8D7C9AE18F9AE5F8D6DF141F8B25B52A5D5C3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <appSettings>.. <add key="AppCenterEnabled" value="False" />.. <add key="AppCenterServiceEnabled_analytics" value="False" />.. <add key="AppCenterServiceEnabled_crashes" value="False" />.. </appSettings>..</configuration>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):684
                                                                                                                                                                                                                            Entropy (8bit):5.189133149847151
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12:TMHdha8iPirqVUpQBCCxCGjg37KYv5K/jIDkcJ//0b6QnQxUrrCYb:2dk8pjQ0nG0Vv5KER5yZp
                                                                                                                                                                                                                            MD5:D1B14DE3FE3D596A3D57E7BE7A95B6D4
                                                                                                                                                                                                                            SHA1:000C7835981F6292DE55CB40238075C4C1BB98B1
                                                                                                                                                                                                                            SHA-256:E9078E2F2D16DCB6035701994BAD2FF12909D566C10A9E80117E34EB1FCD1A1D
                                                                                                                                                                                                                            SHA-512:133B293F6CF7C7D303CAA8A73B208243C1D5CD71711DE83CDCA981269D802F634372BFC252340981DEFC2F8645327FC39BF163A48F5A318923D5205CF4495207
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<Settings xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <Password />.. <ServerGroups />.. <AvailableProtocols />.. <EnabledProtocols />.. <Favorites />.. <SplitTunnelingStatus>false</SplitTunnelingStatus>.. <SplitTunnellingApps />.. <HasSeenSplitTunneling>false</HasSeenSplitTunneling>.. <ConnectOnLaunch>false</ConnectOnLaunch>.. <EnableAdBlock>false</EnableAdBlock>.. <RedialOnDrop>false</RedialOnDrop>.. <IsIKSEnabled>false</IsIKSEnabled>.. <IsConnectFallbackEnabled>false</IsConnectFallbackEnabled>.. <IsMinimizeLaunchEnabled>false</IsMinimizeLaunchEnabled>..</Settings>
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:modified
                                                                                                                                                                                                                            Size (bytes):1803
                                                                                                                                                                                                                            Entropy (8bit):5.3407719505798275
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:MO8mH2HKlIHoVnM6YHKh3oPtHo6hAHKzeEHKKHKx1qH6HKmTH3:fWqlIIVM6Yqh3oPtI6eqzPqKqxwaqqX
                                                                                                                                                                                                                            MD5:077007B5E9C8A61A51283FAC0B0B1260
                                                                                                                                                                                                                            SHA1:F9EABAC9D0664999C4D46AEB57C99D9041FD7F49
                                                                                                                                                                                                                            SHA-256:DD99B5C1E5B54D11E9BE692C4201D18FC5CF4764B5EFFA232EFF142617F9EA2A
                                                                                                                                                                                                                            SHA-512:007E65ABAA38E36B0DD4DD58EDFFDD4538B0F6D269F7067FEED2176DE1971EACF39E0E4BCF4365A383765C1DD49DDD2BFFA044EF94A8B50BB4270A17B74411FF
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceProcess, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Confe64a9051#\48ee4ec9441351bbe4d9095c96b8ea01\System.Configuration.Install.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.X
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1785
                                                                                                                                                                                                                            Entropy (8bit):5.341273156781821
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo1AmHKntHo6hAHKzeR:iqlYqh3ou0aymsqu/qntI6eqzm
                                                                                                                                                                                                                            MD5:595CF857FACB9D100C163C39E2F2FE08
                                                                                                                                                                                                                            SHA1:BD30AB70391652932B3BE7EF5D84A9B4C617B7FF
                                                                                                                                                                                                                            SHA-256:A2E82A1EA4819A2C30BB6C841870CDA86A8DF0DF1B7ED5D18DC707F1B3962995
                                                                                                                                                                                                                            SHA-512:A583D205C967908D847EC7EAD1ED1E039E9BAE253406690D71E621108189374E15E4BAE206C492D85E971EEBD18B8B7A621D686802B4D57126DDB4A1CFFE2ADA
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1312
                                                                                                                                                                                                                            Entropy (8bit):5.411547818704221
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:3l1WSKco4KmM6GjKbmOIl+mN1s4RPQoU99tXt/NK3R88bJ0mrMf:11WSU4Yym/+ms4RIoU99tlNWR83mk
                                                                                                                                                                                                                            MD5:D1B1461DFC1B2E9AD95B50AD1DA25543
                                                                                                                                                                                                                            SHA1:E6079B5B56AEB951FBE2B20690F03D564674E52B
                                                                                                                                                                                                                            SHA-256:008345A0301B2926FB5C62738E29B0483D97BF0ED795D76DF2764FA99F92211C
                                                                                                                                                                                                                            SHA-512:9FDE3EE1520ABE698A07BD3CA06B13DE58A181C566BE3FE843931FF0361F0071933F3ECEC622F8AB9207BB4BB4DA14ACFE7764EB2E51E9C1A56E3EFEC727B5C0
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:@...e................................................@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1198680
                                                                                                                                                                                                                            Entropy (8bit):7.585146963404902
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:kp37lngoh8vbcHnCq/T8A58+RXBkVvCP81H/1Im7M/FFI8pBx:ixOq/oAZmKPoNh7M/FFzpBx
                                                                                                                                                                                                                            MD5:8E960508C5C684B0DD921F919358506D
                                                                                                                                                                                                                            SHA1:E8AC2F09E4D292DA7D9FD617D0E435DBBBAC0063
                                                                                                                                                                                                                            SHA-256:05238D1C415413669BF14351D6E6EBCE193BEB29A6D1417DEEDA762B15D0A687
                                                                                                                                                                                                                            SHA-512:90D25CCC32F0BE9E9B1FCE6FB0C31F6859A66C0EE7D293866B6C7337BA22FBE6246A63E1752CA9A8B83C23381601F7411392A29BAA6D3C31C0646611A21B3151
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F../F.L~..Lz..Qc/..A5.kZ..d@".z]..yO4.-c#.xr..bI4.`]..yO4.x^F...F...F...F...F...F...F...F...F...F...F...F.bg(.yG'.dT#.u.F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.bm4.lZ#.c]2.cM#...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.Zg..D|c.@G%.b]).y...Yr..lC#.b\-...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.?.v.8.q.:.F...F...F...F...F...F...F...F...F...F...F
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):77928
                                                                                                                                                                                                                            Entropy (8bit):6.451537762257313
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:nY46jZxP60lH2liSFlaxaAahjYKTsTBOohsxFOoh6xL:YzzXlWTax85YKTsdOosOoE
                                                                                                                                                                                                                            MD5:F43C6B629BAAAAEE1E7FE095A8821631
                                                                                                                                                                                                                            SHA1:F0E4B84BB1FA6BA985E281F3AFC9642AFCA168B5
                                                                                                                                                                                                                            SHA-256:4196F6776110E75A9670FB5843F373E90E88C0826EAD45A30E9578221FF44AE3
                                                                                                                                                                                                                            SHA-512:2B475850705FA37DD0C1B093D31CCCE48FFDBCC614215FFB304070B4F31E16CA651D4569AF39B36482C848751F1E31B7FD647BD23245718A0A1E877A6417878A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t...0..R0..R0..R.!.S(..R9.lR9..R0..RY..R.p.R2..R.p.R2..R.p.R3..R.!.S1..R.!.R1..R.!.S1..RRich0..R........................PE..L....h.e.................h...n......x!............@.................................9<....@.................................<...x.......................hZ......T.......p...............................@............................................text....f.......h.................. ..`.rdata..,\.......^...l..............@..@.data...............................@....rsrc...............................@..@.reloc..T...........................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):60
                                                                                                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):60
                                                                                                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):394752
                                                                                                                                                                                                                            Entropy (8bit):6.762438184655051
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:eawkohoVYcATU+rugwDyicQGMjmHedtbY5lI34:eaL2kzguaQZaHed0V
                                                                                                                                                                                                                            MD5:AC23DB89F30270BA0E9AD7C458870F41
                                                                                                                                                                                                                            SHA1:A1A176DEBF79833009786F72443AE38375D9623E
                                                                                                                                                                                                                            SHA-256:9FACF275E102D4F10BD1B9C79C57967F323858B3F97981A6424A14890F492061
                                                                                                                                                                                                                            SHA-512:0C677D0DB1535280DB3F585E02D26C2ECA5662FF3EBFE82CC88A20BE92128528F0093D5F0CE6691A8A5005459E7D5C1FF53E4C70EBBB4AC2F14B94EF21BC6780
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...d..^............................@.............@.......................................@.....................................x............................ ..xM...................................................................................text............................... ..`.rdata...*.......,..................@..@.data...............................@....reloc..xM... ...N...l..............@..Bljfcd....P...p...L..................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):6144
                                                                                                                                                                                                                            Entropy (8bit):4.720366600008286
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                                                                                                                                            MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                                                                                                                                            SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                                                                                                                                            SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                                                                                                                                            SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\Desktop\PVUfopbGfc.exe
                                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):3045888
                                                                                                                                                                                                                            Entropy (8bit):6.41066353205617
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:49152:pdJYVM+9JtzZWnoS2VC23aun8+f5KuGP+VYNCWNtdH333tQ:PJYVM+LtVt3P/KuGP+VYNCuf333i
                                                                                                                                                                                                                            MD5:259E3EE4646FC251C3513EEF2683479F
                                                                                                                                                                                                                            SHA1:BE09457567F0562E8942A28BD90759F6DCE6DCB5
                                                                                                                                                                                                                            SHA-256:BD9F32A9B7B9663A3AFDD1DC0CCC3D6423783B360DB341691FE2FE71C543EC53
                                                                                                                                                                                                                            SHA-512:56607419EF2E2F98A8DAA6478DEA4B49925F4A17AB649E450F34331490281E2FCF976F17813F1A80FA460EE258C02901528A43B508093098135C1FADB5902B24
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....gf..................*...........*.......*...@..........................P/...........@......@...................P,.n.....,.j:....,.$....................................................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.rsrc...$.....,.......+.............@..@.............`0......./.............@..@........................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10711
                                                                                                                                                                                                                            Entropy (8bit):7.2254581318251425
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:PqDhDNF748XJCO39JnxrEwJqKkhYCxXA6qnaj/rHr:OXPJxXxkh3xXhlzX
                                                                                                                                                                                                                            MD5:225E7BA0E5E2D46813E5C858A4D0D5B0
                                                                                                                                                                                                                            SHA1:5DD49014764F634164520583FD0CEC87AB1A1625
                                                                                                                                                                                                                            SHA-256:B0BAF5CB84FA4ACB34B77A6231052061DA6B8676D216833724B7A602622161FB
                                                                                                                                                                                                                            SHA-512:9C77ADF7E71ACA94489DFEB536F796A017B7C05771962274BAE2C614E2AE6799CCEB36CC58AC470184C37F52DEAC75988BB14E6A329F432C6D7CEDBCA18272A8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.)...*.H........).0.)....1.0...`.H.e......0..M..+.....7.....>0..:0...+.....7..........dG.'$....g..191023085812Z0...+.....7.....0..T0.... .}..ID.U..;.t.`.U..h.z.F.......K1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... .}..ID.U..;.t.`.U..h.z.F.......K0....._Ne...=.....N.._-%1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.....D.......L..S.4..b.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... .?;..{.x....H..4...k).VB.......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... .?;..{.x....H..4...k).VB...........0...0....+.
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10711
                                                                                                                                                                                                                            Entropy (8bit):7.2254581318251425
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:PqDhDNF748XJCO39JnxrEwJqKkhYCxXA6qnaj/rHr:OXPJxXxkh3xXhlzX
                                                                                                                                                                                                                            MD5:225E7BA0E5E2D46813E5C858A4D0D5B0
                                                                                                                                                                                                                            SHA1:5DD49014764F634164520583FD0CEC87AB1A1625
                                                                                                                                                                                                                            SHA-256:B0BAF5CB84FA4ACB34B77A6231052061DA6B8676D216833724B7A602622161FB
                                                                                                                                                                                                                            SHA-512:9C77ADF7E71ACA94489DFEB536F796A017B7C05771962274BAE2C614E2AE6799CCEB36CC58AC470184C37F52DEAC75988BB14E6A329F432C6D7CEDBCA18272A8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.)...*.H........).0.)....1.0...`.H.e......0..M..+.....7.....>0..:0...+.....7..........dG.'$....g..191023085812Z0...+.....7.....0..T0.... .}..ID.U..;.t.`.U..h.z.F.......K1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... .}..ID.U..;.t.`.U..h.z.F.......K0....._Ne...=.....N.._-%1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.....D.......L..S.4..b.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... .?;..{.x....H..4...k).VB.......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... .?;..{.x....H..4...k).VB...........0...0....+.
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 3 07:29:22 2024, mtime=Thu Oct 3 07:29:27 2024, atime=Thu Jun 27 19:18:16 2024, length=2059432, window=hide
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1771
                                                                                                                                                                                                                            Entropy (8bit):3.2158852597305763
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:8Jh1+ddv5O8IcQhpLAskd/Z6d/nd/VkIbfd/VyRm:8/1+ddv5rTy8skd/Z6d/nd/Vkcd/VO
                                                                                                                                                                                                                            MD5:CCA5624B296E564CF2C76B52AE01CF4D
                                                                                                                                                                                                                            SHA1:0C6471A781723C9922C3DA3B6D7A017EAD00A1D5
                                                                                                                                                                                                                            SHA-256:0C28677882D1331E76DD2FD911288FF6369FEA165AEC353CD66694D5D9A95538
                                                                                                                                                                                                                            SHA-512:988AC62EC580A6458DBEB9C9CBA74D104CC7662637795DD76B742551B2E715E113971F20D4CEBCACA5FCF11409483CEAD2CC69F8287DD8DC29CA037BBA73A727
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:L..................F.@.. .....%Yn...s3/\n......$.....l...........................P.O. .:i.....+00.../C:\.....................1.....CY.C..PROGRA~1..t......O.ICY.C....B...............J.....t.&.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....CY.C..FASTES~1..F......CY.CCY.C....*.......................\.F.a.s.t.e.s.t.V.P.N.....j.2..l...XH. .FASTES~1.EXE..N......CY.CCY.C....J.........................F.a.s.t.e.s.t.V.P.N...e.x.e.......Y...............-.......X...........?..(.....C:\Program Files\FastestVPN\FastestVPN.exe..<.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.F.a.s.t.e.s.t.V.P.N...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.a.p.p.-.i.c.o.n...i.c.o.........%SystemDrive%\Program Files\FastestVPN\app-icon.ico...............................................................................................................................
                                                                                                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Oct 3 07:29:22 2024, mtime=Thu Oct 3 07:29:27 2024, atime=Thu Jun 27 19:18:16 2024, length=2059432, window=hide
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1801
                                                                                                                                                                                                                            Entropy (8bit):3.234896182696819
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24:81h1+ddv5O8IcQhpLAsKd/Z6d/SCqd/VkIbfd/VyRm:8b1+ddv5rTy8sKd/Z6d/sd/Vkcd/VO
                                                                                                                                                                                                                            MD5:DA925845CE0501E0C505B7AF7100A3CE
                                                                                                                                                                                                                            SHA1:FFDEF442AE7FDDB1F34D821DCBE4C0EC89AAB289
                                                                                                                                                                                                                            SHA-256:0942B800417A810F2B393B166202C8FBE16952CC8D9F29911600657C6E9A0B20
                                                                                                                                                                                                                            SHA-512:A168394EF5DBAB87C0B1B010291F7CFE28A8F4007CED8582185CE94A1E149DDD3543D2912B86A9108C2A687C6A7C69EF9A9423EAAAC44D5829CC25C96EDFE023
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:L..................F.@.. .....%Yn....8\n......$.....l...........................P.O. .:i.....+00.../C:\.....................1.....CY.C..PROGRA~1..t......O.ICY.C....B...............J.....t.&.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....CY.C..FASTES~1..F......CY.CCY.C....*.......................\.F.a.s.t.e.s.t.V.P.N.....j.2..l...XH. .FASTES~1.EXE..N......CY.CCY.C....J.........................F.a.s.t.e.s.t.V.P.N...e.x.e.......Y...............-.......X...........?..(.....C:\Program Files\FastestVPN\FastestVPN.exe..B.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.F.a.s.t.e.s.t.V.P.N...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N...-.a.u.t.o.r.u.n.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.F.a.s.t.e.s.t.V.P.N.\.a.p.p.-.i.c.o.n...i.c.o.........%SystemDrive%\Program Files\FastestVPN\app-icon.ico.................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):321936
                                                                                                                                                                                                                            Entropy (8bit):6.249416182192696
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:49C2dRHqGR0N9BdVLATWWFQEDyhNSDEAIjUoMfqC9ulMdUBIKL:Z2dRHqGRyhAT9FxoSIAIx/C9ulMe2KL
                                                                                                                                                                                                                            MD5:5C1752EF16C7E3B28D9662E3C08FB08F
                                                                                                                                                                                                                            SHA1:4B3F3BE508D4C6CD8374FBB812EE30E99F8128C0
                                                                                                                                                                                                                            SHA-256:1BF45DF354D53D400EAF644E205DADDB0C07B408EB0C03D8CCFF765BD6659FB3
                                                                                                                                                                                                                            SHA-512:296F8AA642527C3A2364B9FA0E1C9F3EE3B7AD6F82D51685F71601F4E4A0E5DA5327FF1E1884F6264E7961417D54028B4E9BBE1B836968FF0F9D6685EBEE0327
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Z.H.;...;...;..6K...;..6K..q;.......;.......;.......;..6K...;..6K...;...G...;...;...;.......;.......;....p..;.......;..Rich.;..........................PE..d...O.wf.........." ...(.*...........0....................................... ......h1....`..........................................t..t...Du..x................-..............................................(.......@............@...............................text...,(.......*.................. ..`.rdata..rC...@...D..................@..@.data...x7....... ...r..............@....pdata...-..........................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):397712
                                                                                                                                                                                                                            Entropy (8bit):6.40156340476818
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:ThaEhq4cY0f8IlE6BZR2nUx9lYOUgLZUrd:T4EhqR5lE6xSUx9lYOUg6rd
                                                                                                                                                                                                                            MD5:42C063882FD7CEDD3CC62356450D8987
                                                                                                                                                                                                                            SHA1:A09DB77F70A6F7D7C59418FC08250A8E13E8A60D
                                                                                                                                                                                                                            SHA-256:37D1EBFC8F423BF02DEC598C6421E4124C8C5666C27782180D84003039E88DFF
                                                                                                                                                                                                                            SHA-512:77AC9C670F91059B2CAA12DA9B5417CD71D525F900B7DDA51FFCF499AA2882734B342F6803814C6FDE1B527C9742ED9CF67AB1EE8D141CB437B57C979D89B456
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q{.?...l...l...l.j.m...l.j.m...l.j.m...l..m...l..m...l..mY..l.j.m...l.f.m...l...m...l...l...l...m...l...m...l..zl...l...l...l...m...lRich...l........PE..d...j.wf.........." ...(.....L......l........................................0......E.....`..........................................*......x+..........h[.......3........... ..`...............................(...p...@............................................text...|........................... ..`.rdata...o.......p..................@..@.data....?...@...(...2..............@....pdata...3.......4...Z..............@..@.rsrc...h[.......\..................@..@.reloc..`.... ......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):346512
                                                                                                                                                                                                                            Entropy (8bit):6.253406880555808
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:sQz5UqJwVKCsnOeuj9PDnBQpUZyNVHhl/FPTCgTx:sQ1UqChsnOeMhBaQy9l/FPW0x
                                                                                                                                                                                                                            MD5:9641732F1DB2EAB135130C9128C1427A
                                                                                                                                                                                                                            SHA1:88B0857CFE055A1D920E55B3094116162E4EAA00
                                                                                                                                                                                                                            SHA-256:B47CD11E4089FE0AE8BAF4E05B4CCF19B1DFE403FD392649E9253C05D58F3CBC
                                                                                                                                                                                                                            SHA-512:5C87B26E51771B61FDF87D577781B1FB163527D0F03E74327BC11EA1A24B1B449D4AB23F7393466ED4BAF3809A5151EB30928F462B5FCD55BB8DE4BD733856A8
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]..B........................f......f......f..J.............................a......a......aZ.....a.....Rich...........PE..d...r.wf.........." ...(.p...........v...............................................=....`.........................................p...|.......x....`....... ...1...........p..,...PK.......................M..(....J..@............................................text...`o.......p.................. ..`.rdata...V.......X...t..............@..@.data...T8......."..................@....pdata...1... ...2..................@..@.rsrc........`....... ..............@..@.reloc..,....p......."..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):313744
                                                                                                                                                                                                                            Entropy (8bit):6.2705364965004815
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:7OqwvZdI0CglL0fN5ra4KBb5cSgQkJjMoplVNLQDrkHW:6qwvigF0fN5OB5dgQkBplVNLQDeW
                                                                                                                                                                                                                            MD5:2EEEB7F9DCC44DC28CBFBAF94176CA6F
                                                                                                                                                                                                                            SHA1:65055D6EE4E5A322DB3C74B0EF8CDADECDB32737
                                                                                                                                                                                                                            SHA-256:966DDE59F9ABD125F763A95273BF923C2543A4B9F43F6F0C5587CCA308BD9FFD
                                                                                                                                                                                                                            SHA-512:5919481A1768E9B19CE79ADDDFFC25A6BCDA326232FEB6E61729C2173292F3E2EC7266C646090DCC061A2E9643084583E43947774FDF76842316249B3B2E911F
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@D..%...%...%...U...%...U..%...U...%......%......%.....H%...U...%...Y...%...%..}%.......%.......%....v..%.......%..Rich.%..................PE..d...t.wf.........." ...(.................................................................`.........................................0].......]..P................,..............................................(.......@............0..x............................text...,........................... ..`.rdata..h;...0...<..................@..@.data....7...p.......T..............@....pdata...,...........r..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):344464
                                                                                                                                                                                                                            Entropy (8bit):6.268258211828341
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:eyhvW10qILfhXrbR0fkN0addZrKKOYQ9gsYlFtx/pP8fW5:eyhW0qIF10fkNBvgK5QRYlFtxxP8fW5
                                                                                                                                                                                                                            MD5:E6C6C72226677BACF6EC83BEDA63F49D
                                                                                                                                                                                                                            SHA1:C0E75C5A5B9D7C8CD07E80A2BA4D809801EFF649
                                                                                                                                                                                                                            SHA-256:2018F17E324516FC891E5C868E2045970855A3A1521D73F0F6AE12EBF12CFBBA
                                                                                                                                                                                                                            SHA-512:3A52B60711EFB4A34E5FF655E60D51A29C6D4B2CD4561A421A51647D5FCB2C75F1468A8F93C25206EDEBCF259112A4C7DA41F90181FF7E53946E1FFF5FB3F353
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@..!...!...!...Q...!...Q..l!...Q...!.......!.......!......!...Q...!...]...!...!..C!......!......!...~..!......!..Rich.!..........................PE..d...z.wf.........." ...(.l...........e...............................................j....`.........................................0.......8...<....`....... ...2...&.......p.......M.......................O..(....L..@...............x............................text...tj.......l.................. ..`.rdata...Q.......R...p..............@..@.data....=......."..................@....pdata...2... ...4..................@..@.rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):17983376
                                                                                                                                                                                                                            Entropy (8bit):6.549243204630475
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:98304:2M5ISKnKKu/60i9gzTcriqcN9MX4C7GsIAfiz8xS6RWhi62KFfQWmLu2EkKZ3uNx:xO6ggzLI7op6Rt69L2kuNx
                                                                                                                                                                                                                            MD5:E3E8D995E4A1D5E84EE11DBD58D21F3B
                                                                                                                                                                                                                            SHA1:52E7AFB03DD3F45F7B8839879FEC1ACC7965A62E
                                                                                                                                                                                                                            SHA-256:29782AC1F424865FA1007A5F818F35ABB5307B01C099AAA38067513E516A0454
                                                                                                                                                                                                                            SHA-512:F4FB26D4DC2D91D36FD8F26B9BE6B74F50DF94DE530AFDD8D2D5E9D6D6300B52FB9C6EFBD94A95D630094CE59D5D1AA1B898F810BE8806B7E9DFC5466D312659
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............J..J..J..fJ..J...K..J...K..J...Ko.J...K..J...K..J...K..J...K..J..Jh.J..J..Jr..K..Jr..K..JRich..J........................PE..d...]. f.........." ...".d....=......;....................................................`.........................................0[.......b...............p.......L..................T.......................(...`...@....................Y..`....................text... b.......d.................. ..`.rdata....-.......-..h..............@..@.data................v..............@....pdata.......p......................@..@_RDATA..\............2..............@..@.reloc...............4..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):929318
                                                                                                                                                                                                                            Entropy (8bit):7.900306716974538
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:24576:+20deSdhsNk795wZ08KxwK29H7hfnn3MQYa:+20ddsy95WKxwKQnc2
                                                                                                                                                                                                                            MD5:2D1F8BF06610A54B8A61894239012C3B
                                                                                                                                                                                                                            SHA1:98BA3AEC7A32B6BCB264B51364A0A8A664E4FE82
                                                                                                                                                                                                                            SHA-256:8FAFAB1032577F2EDC583C676A9BBFEECF929B5BE22950183C9A77BC2123798B
                                                                                                                                                                                                                            SHA-512:AE9DB2DEA48BFC54274975306FA98921882EA43A590DCF60733B964253C3E9D97BE9CC97F45F18ECCB65802C0EC4599BAFBFF781FE635D6364BD0B657C95655E
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:..]r.U..x..F.q...aI..`vkqqNsSLg..b..F.Iq`..o`y.gm.N._a.lJF.D\FpNm.RRYR.b.to.r.mhG.x.._...F.f.WO.nH..l.ldPH.[m..h..r..YX..mq....i.Q....F....H.m..r...N.JY\k.`T..nLx].oqf..........b.hV.m.TWicY.dpV....IE.d.Tjs.^tS..CUW..F....\......r.yrs.C.I.Xcql..c.....qe.K..T.^..q.i.B.NV_...gk..ACuS..n..]..g.O.yX.....u.J^dPj.g.mHP....E]B..h...HtjI.M\.^.cs.H...q...........p.x^..urE...C`..K..h...`i.M.H...^.Pt..S..p...Y.TP...E.M....\...k.S.m.Hu...Q.....juxX.s.gUG..wrAT[.gc..H...V....j.h.kL...Kgd[bMW...EKa.h..jw....D........F..qFC..Q.HFS.Z.L.....h.B.r...`.xqZ..O.bK.I_kEChAWH`.K..b.kqG.k..cw.i..x...d.yC.....R...^[]]\JD.u\v.HM.....p.a.y]ugLa..Dc.f.MSa[^.sV.Z.hWdD..nRr.V..D.h.Zx.D....O.guI]W.f.].qw.y.UPyO..T.Em.eV..p.^L.j.lPh....jMY.g.Vf.K.YHp[grw.kbx..T.V.]SQm..Eg.\...^q...u.gTh..w..wJ...a.bc..b.....gQo..TtjB.TU....eA..QY....V...uf..B.\oh.w.J.D..R.....x..[_.m..wMD.c.Er.D..E_f...Cm.HX].CKb....E..S...H..Dj.d...kNa.^F...s.teH..w......w......Q.i.d.XD..n..S...u....M.OS.....M...rS.E.G.h.R.\U.N.ASoEw.a.B...O`..DO.Ck.
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):63258
                                                                                                                                                                                                                            Entropy (8bit):4.638400083452387
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:PcJillRMp5RLRYkKJdcmFT38Q9aSePEUX5:PcJiDRMD9YdtePz5
                                                                                                                                                                                                                            MD5:127A512367895E269AD9922079C47761
                                                                                                                                                                                                                            SHA1:7444878FEF13B7B4FCBE57D2DB2C527A34CA48C5
                                                                                                                                                                                                                            SHA-256:E841508B1B3D7615F17E691334ECB6B1A7F7A83BC531BFF272E85F048AA3DDFD
                                                                                                                                                                                                                            SHA-512:90E486FA09945BCCBD24542C31F832BEC4AA6EAE7D7A1522526018D0AC38CE855F545E1AB7AEFA1B6F7D78E6F0C8333A607E8A9BF1DCFA74E9E4F3B113AFD15F
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.c.jPxZ...PF...L.f.Ih..t...[.....O...O.o..l...Y.u.....mZ^P...u.v.l...E...W....f.....d.u...M.J.Nyd.i....uH.o.Jid.E..^..x..x.Z..kfmuexCyd.RD._Cm...]G....jwcu.q[.xx..Vj.bsRP.lh...t..j..s...f.ZgNgGc.....Rdk.sHK..q[jD.S.f.i.aZWv..F.O.tp...Zs.n..S..o..be.....d.^Xe..QpnXhy^..eVU..qwe_...[MZ..MTbS.j..n..u..]y.u.t..J.rcm..`e.y...IF..N\..Wt..uOE.dQ..^b..ksh.q..p.U..aLW.EfqS.H.Lm.p.OA..Sa...EY.vUbN.D.V..KqdWL....pE..Enuj.RG.`.R.s....mV.W.i...nc.a.^.m...hg...a...FGX..J...E`....\Z...U...Q....II..xk.]L.mX]........W.F.X.k.f..^M[.....y.Oj.h.eOk_Dj..QRT..SK`.T..G^..n.t..\N..CR.l...G..p..r..V..NoUZVJH.ld..Y.h..jVT.n..S..poIbY.X`.F.mp.BoZ.rW..Wo..b.TI.].RmK.pY..^..F..gRc..q....v..WGn.......C]g...Qh..\Mq..._.....kXB..HV.I]...D.ZIDW[...K.A..H.Pt..O....xJtu......J....^o..J.....WWY..L.VE........b.....[..oA_.n.ac...MKn..W.Q.maX........s..s..c[...Ij....Mu.ux...tPT.\.[..F..gpAH..mA...U..N...mE..y.\..q.C.gG..o..Kms.LL.P\.....cPDD.g.Y.rJZ.aF.iTA....].S.NL.r...l..]...n.`.]`..G^QQuPhO.DL.k.S_y.hD._..sour.i.wfg..`yI
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):545680
                                                                                                                                                                                                                            Entropy (8bit):6.371479071684404
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:8xqABhfuM6KsuJPR9K+EvLHhDcsgsEO5CllKDh/eF4:8xqDM9+lHNcsgACllKDh/eF4
                                                                                                                                                                                                                            MD5:2D885495E81A8B8D1D5305FE20566484
                                                                                                                                                                                                                            SHA1:F1D2083D399DD48927CBD83E23F90AD3CE3E0632
                                                                                                                                                                                                                            SHA-256:EB2E18881DDD80A3E54527264B3E7C5046F15854A196B76CCAD28E8258F3F1B2
                                                                                                                                                                                                                            SHA-512:E2BB9F8E377B381CC13538B39E8B3FB749341FCEF84E7B26749BF35141C6C52A48636BB00C6FA7C585EEC4C01B03CD0EC38C8F3E85E0CA2C2CDA26D026DEF326
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Do!O..O...O...O..~L...O..~J...O..~K...O..L...O..K...O..J.K.O..~N...O..rN...O...N.y.O...J...O...O...O.......O...M...O.Rich..O.........................PE..d...|.wf.........." ...(.&...&......................................................$D....`.............................................|.......P....p....... ..TB...8..........P...p........................ ..(...0...@............@...............................text...P$.......&.................. ..`.rdata.......@.......*..............@..@.data...tA.......*..................@....pdata..TB... ...D..................@..@.rsrc........p.......&..............@..@.reloc..P............(..............@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):323472
                                                                                                                                                                                                                            Entropy (8bit):6.260791393809843
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:xadPqy3/nKyWFZS3PCmxiVvUTiJ+1I2hWHlHTkPXdxs4:wqyAA3PCmwV8i41I2gHlHTkvdW4
                                                                                                                                                                                                                            MD5:128D06B8C5739F35A7C76A76BF1E6149
                                                                                                                                                                                                                            SHA1:901F9698BF4C4A10E8E902E6DBDDF1782E1067D0
                                                                                                                                                                                                                            SHA-256:BF585DBC4E4DCE47F9EFDEEAD15F67A69644CE6F1177CEEC518882DC85ECC096
                                                                                                                                                                                                                            SHA-512:ECE9254486347751D6F68AE86AFB36508FED81B00C4588F555DB584A0E9DE5F4710A24E6BB5B2B19A25BEE20AA4BF90068F9EB2E37B48271614B6C97199E419C
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.........................Y...........>w......>w......>w..............<...........u....p.......p.......p......p......Rich............................PE..d...Y.wf.........." ...(.............5....................................... ............`..........................................t......0u..<...............L/..................P...........................(.......@............@..P............................text...0,.......................... ..`.rdata...B...@...D...2..............@..@.data...X6....... ...v..............@....pdata..L/.......0..................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):543632
                                                                                                                                                                                                                            Entropy (8bit):6.3781262731970685
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:zqzF5VH24Jy+0PeZOYbxobw+QY0heC9lVNLETyoK:zqh32SRoc+QY0n9lVNLETbK
                                                                                                                                                                                                                            MD5:94267176E212B8EBFF06728CC6C3F432
                                                                                                                                                                                                                            SHA1:F65313083C2B3177F405B7AB884BA0A9BE3251D9
                                                                                                                                                                                                                            SHA-256:08D08CBFA4D5531CEEE16BFCB2255EDA79C5B7F7C0894C4E6F49F673457AB362
                                                                                                                                                                                                                            SHA-512:014459C9D3DBE7C09E0D6DB085CE9F715248BA6D784845339B2D6896A8BA7B680C93E707D4990350E30C8853A95FD0DC6F8E9244643787DB65AB8A2F95C26967
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W..6..6..6..XF..6..XF...6..XF..6......6......6.......6..XF..6..}J..6..6...6.....6.....6...O.6.....6..Rich.6..........PE..d...~.wf.........." ...(.....4......L.....................................................`.........................................p...........d....p....... ...B...0..........................................(...p...@............0...............................text............................... ..`.rdata.......0......................@..@.data....J.......2..................@....pdata...B... ...D..................@..@.rsrc........p......................@..@.reloc............... ..............@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):323472
                                                                                                                                                                                                                            Entropy (8bit):6.24323878406639
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:aK/qrBUA8kikYQQ2sXvNnot1bdNtb1lHSdrkjoE:a8qC5kikpQX1ny1bdv1lHSdYjoE
                                                                                                                                                                                                                            MD5:BFEC2012B6589D4496EA0283E90A5269
                                                                                                                                                                                                                            SHA1:813E3FAD5CFE4A30E20F05080D106811C5544FA3
                                                                                                                                                                                                                            SHA-256:F9406ECAA9C86F2946F8B9D997F0210F1F5EE974BE6548D1DB039014D1B45552
                                                                                                                                                                                                                            SHA-512:396F28EB15ED793DB453CD3B3E9118F4386FE24A75E3F3914E881CCA3ADA8918B98751BDAC51C4A5E897CCA1E700B2A545686463A6B0DD6719EA172682CFB928
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`&..$Gt.$Gt.$Gt..7w.!Gt..7q.Gt..7p.4Gt...w..Gt...p.*Gt...q.iGt..7u."Gt..;u.'Gt.$Gu.\Gt.7.q.#Gt.7.t.%Gt.7..%Gt.7.v.%Gt.Rich$Gt.........PE..d...^.wf.........." ...(.*................................................... .......7....`.........................................@x..|....x..d...............P...............................................(.......@............@..x............................text...@).......*.................. ..`.rdata...F...@...H..................@..@.data....6....... ...v..............@....pdata..P........0..................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):589712
                                                                                                                                                                                                                            Entropy (8bit):6.371606969587959
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:Qnu0YqCbnvh0xDqjFR0NdzhdkPJZIR0vnrXkcc9VNLqYWTF:Qu0YqInZCD7mZI0vnrPc9VNLqYWB
                                                                                                                                                                                                                            MD5:EAB165F7A1856FC4FC191416A26F20F3
                                                                                                                                                                                                                            SHA1:3E3BAAA9A8AE20680D4B347A3A65E4A388DC0F4D
                                                                                                                                                                                                                            SHA-256:A2C87DFE4D43C7CC8AC44F2AC43BD45EC4F3F6BA87A2C73AE8B55F26286600E9
                                                                                                                                                                                                                            SHA-512:897E0F107BEB1FCC6402183C535F2550E954B379451415E8B40403D0575EFA6E1D1373F9F0B9A0649AB09515259490C7BFB9E9926F76735EE513F68460FB5143
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:q..T"..T"..T"..W#..T"..Q#W.T"7MW#..T"7MP#..T"7MQ#..T"..P#..T"..U#..T"5.U#..T"..U"T.T".JQ#..T".JT#..T".J."..T".JV#..T"Rich..T"................PE..d.....wf.........." ...(.....P.......8.......................................@............`..........................................\..x...8]....... ..........tF...........0......@...........................(.......@............................................text............................... ..`.rdata..2...........................@..@.data....C.......,...^..............@....pdata..tF.......H..................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):539536
                                                                                                                                                                                                                            Entropy (8bit):6.374120901700144
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:12288:F2qV/eGvVJVbhqs7MRkPXpaCLz9gS+f/9VNtP8zC:F2q9rVJeMp1Lz9gj/9VNtP8zC
                                                                                                                                                                                                                            MD5:7024D49DF9315B5718F40FCD29A8656F
                                                                                                                                                                                                                            SHA1:EF243D1EC09F2FB714459D596F40A87B5B51C054
                                                                                                                                                                                                                            SHA-256:51877E41297AE94FE33D01D980717AE18938A3E81A32C57ADC77D754EF7E66BE
                                                                                                                                                                                                                            SHA-512:D9B7661B923B45020641F80A4695079A86F92848A022C8374C9339258A3F63D628000628CF75163B7C707A8506BB4D4928A1EA75E09FA6416EB9A2150EB5B705
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k....m...m...m..zn...m..zh._.m..zi...m.?.n...m.?.i...m.?.h...m..zl...m.=vl...m...l.}.m..h...m..m...m.....m..o...m.Rich..m.........................PE..d...`.wf.........." ...(.....&......<........................................p.......N....`.........................................P...p.......P....P..........<B... .......`..\...P...........................(.......@............ ...............................text............................... ..`.rdata..,.... ......................@..@.data....B.......*..................@....pdata..<B.......D..................@..@.rsrc........P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            File Type:Generic INItialization configuration [BeginLog]
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):58713
                                                                                                                                                                                                                            Entropy (8bit):5.206566591601887
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:384:OGdni80C/8g0atRf7yr14ujuNY9AZi3Z/oUtwrP3UQGSE254VkWe/DnJL6zsf4P6:Own95cdyYloiwTyz25nUshj
                                                                                                                                                                                                                            MD5:60552CCBEDF0DB88B21D29A4FCB27D7F
                                                                                                                                                                                                                            SHA1:834DC74C2EB26EC5AEB5447465A9A8F58D27082E
                                                                                                                                                                                                                            SHA-256:6830C732628CCCA1487A2D5A02BDEAB20DB6178F05FD2BFD80A3667354D429AA
                                                                                                                                                                                                                            SHA-512:6B83B359B6B6D57948E725905E38FCAF6A5881B226E05C3BC4D2CCF9B84F461C92C6C78A641987B39C1165A2D1F998229E48333E24DE4F3FB83545FFE50594B9
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):524288
                                                                                                                                                                                                                            Entropy (8bit):0.42451526077131835
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:IL/zm8DmT1xMS92sICkjd0x5AUko5HOLboAcKYzFlgbmCcs8m:IL/ZM7mjhRoZO/oAPRIm
                                                                                                                                                                                                                            MD5:2BC3848BBB6892617503C92520EB9184
                                                                                                                                                                                                                            SHA1:532900C958CD40D3E3EFE1E26C76FB1A6DF2349C
                                                                                                                                                                                                                            SHA-256:68DC35609AA81E0E278FF93EEBAF206BD7681DDD7A0DAF03287D640773DD56DE
                                                                                                                                                                                                                            SHA-512:5EC4281BBA43A83D63B4CEC206104B0D188E5432030BF27FF456F3A3C6068CCF3DDAA582F71A56C6DD8418F3B7241753454D274BDDAAC79A1A3C795DE18B18DD
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:....8...8...........................................!....................................?......................eJ......Z.`n...Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.6.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.6.1...........................................................@K5..............?..............N.e.t.C.f.g.T.r.a.c.e...C.:.\.W.i.n.d.o.w.s.\.L.o.g.s.\.N.e.t.S.e.t.u.p.\.s.e.r.v.i.c.e...0...e.t.l.........P.P..........?..................................................................8.B..?......19041.1.amd64fre.vb_release.191206-1406.....7.@..?.......I.[.8+m.!N8$......NetSetupEngine.pdb......4.@..?.........>*.....Nr8..a....NetSetupApi.pdb.db......4.@..?.........E_iC...F........NetSetupSvc.pdb.........4.@..?.........E_iC...F........NetSetupSvc.pdb.............................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            File Type:JSON data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):55
                                                                                                                                                                                                                            Entropy (8bit):4.306461250274409
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                                                                                                                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                                                                                                                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                                                                                                                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                                                                                                                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10711
                                                                                                                                                                                                                            Entropy (8bit):7.2254581318251425
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:PqDhDNF748XJCO39JnxrEwJqKkhYCxXA6qnaj/rHr:OXPJxXxkh3xXhlzX
                                                                                                                                                                                                                            MD5:225E7BA0E5E2D46813E5C858A4D0D5B0
                                                                                                                                                                                                                            SHA1:5DD49014764F634164520583FD0CEC87AB1A1625
                                                                                                                                                                                                                            SHA-256:B0BAF5CB84FA4ACB34B77A6231052061DA6B8676D216833724B7A602622161FB
                                                                                                                                                                                                                            SHA-512:9C77ADF7E71ACA94489DFEB536F796A017B7C05771962274BAE2C614E2AE6799CCEB36CC58AC470184C37F52DEAC75988BB14E6A329F432C6D7CEDBCA18272A8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.)...*.H........).0.)....1.0...`.H.e......0..M..+.....7.....>0..:0...+.....7..........dG.'$....g..191023085812Z0...+.....7.....0..T0.... .}..ID.U..;.t.`.U..h.z.F.......K1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... .}..ID.U..;.t.`.U..h.z.F.......K0....._Ne...=.....N.._-%1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.....D.......L..S.4..b.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... .?;..{.x....H..4...k).VB.......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... .?;..{.x....H..4...k).VB...........0...0....+.
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:Windows setup INFormation
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):7537
                                                                                                                                                                                                                            Entropy (8bit):5.046488463217706
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:wr8tW9yCTi3K4vlQd22bjR+iAUC7bdP+io3DcNSj6jvKFkinuEQTXvzLd4Z:LWlGMdkxzo3DcNSj6jvKFkinuEQTXvzq
                                                                                                                                                                                                                            MD5:50D29CA2E3DDB8A696923420EC2AC4FA
                                                                                                                                                                                                                            SHA1:D85F4E65FE10F13DED1780DDBD074EDFC75F2D25
                                                                                                                                                                                                                            SHA-256:817DFF7F4944A255A0A33B8D74EB60A755D8D268CC7AFD46FCE41E102E0A004B
                                                                                                                                                                                                                            SHA-512:03778A9CDDD23639C88E24BB5D0446DA3A400BB6B3321FB35887CD23D88D0F7AD3FE911642CC7F8D16D29CD9E42106851B0028379E8DBCB3C6721C238FC4A0D3
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:; ****************************************************************************..; * Copyright (C) 2002-2014 OpenVPN Technologies, Inc. *..; * This program is free software; you can redistribute it and/or modify *..; * it under the terms of the GNU General Public License version 2 *..; * as published by the Free Software Foundation. *..; ****************************************************************************....; SYNTAX CHECKER..; cd \WINDDK\3790\tools\chkinf..; chkinf c:\src\openvpn\tap-win32\i386\oemvista.inf..; OUTPUT -> file:///c:/WINDDK/3790/tools/chkinf/htm/c%23+src+openvpn+tap-win32+i386+__OemWin2k.htm....; INSTALL/REMOVE DRIVER..; tapinstall install OemVista.inf tapoas..; tapinstall update OemVista.inf tapoas..; tapinstall remove tapoas....;*********************************************************..; Note to Developers:..;..; If you are bundling the TAP-Windows driver with your app,..; you should try
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):10711
                                                                                                                                                                                                                            Entropy (8bit):7.2254581318251425
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:192:PqDhDNF748XJCO39JnxrEwJqKkhYCxXA6qnaj/rHr:OXPJxXxkh3xXhlzX
                                                                                                                                                                                                                            MD5:225E7BA0E5E2D46813E5C858A4D0D5B0
                                                                                                                                                                                                                            SHA1:5DD49014764F634164520583FD0CEC87AB1A1625
                                                                                                                                                                                                                            SHA-256:B0BAF5CB84FA4ACB34B77A6231052061DA6B8676D216833724B7A602622161FB
                                                                                                                                                                                                                            SHA-512:9C77ADF7E71ACA94489DFEB536F796A017B7C05771962274BAE2C614E2AE6799CCEB36CC58AC470184C37F52DEAC75988BB14E6A329F432C6D7CEDBCA18272A8
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:0.)...*.H........).0.)....1.0...`.H.e......0..M..+.....7.....>0..:0...+.....7..........dG.'$....g..191023085812Z0...+.....7.....0..T0.... .}..ID.U..;.t.`.U..h.z.F.......K1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0U..+.....7...1G0E0...+.....7.......010...`.H.e....... .}..ID.U..;.t.`.U..h.z.F.......K0....._Ne...=.....N.._-%1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0<..+.....7...1.0,...F.i.l.e........o.e.m.v.i.s.t.a...i.n.f...0.....D.......L..S.4..b.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0.... .?;..{.x....H..4...k).VB.......1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0:..+.....7...1,0*...F.i.l.e........t.a.p.0.9.0.1...s.y.s...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... .?;..{.x....H..4...k).VB...........0...0....+.
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                            Category:modified
                                                                                                                                                                                                                            Size (bytes):3475
                                                                                                                                                                                                                            Entropy (8bit):5.365338168673359
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:96:QO00eO00erMwUgWUg0B1kE3ZhpJp8ZpkRepk3YpgpNN:QO00eO00erMwmkB1kAv
                                                                                                                                                                                                                            MD5:C62C0D54B65581B27C052572D9C54CCD
                                                                                                                                                                                                                            SHA1:3C314F8D1DD9DDFCEA383C730317DAC7CC461322
                                                                                                                                                                                                                            SHA-256:2C3B67034457A4C188802FFD0D39F05B425417E306027061DEC2FA8118F72581
                                                                                                                                                                                                                            SHA-512:261B5BAF63FCED8457B11091F3636F6F93CBF9DFBBD8669ED7EA4E33A3A5D6CF012DA81DD6F26E2A9F69DDC0B7C3FF97D8EF05EDD5173B2B7457D1963CF6D613
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: SyncAllDBs Corruption or Schema Change..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 08:57:12 03/10/2023: SyncDB:: Sync sta
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\xcopy.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):104424
                                                                                                                                                                                                                            Entropy (8bit):6.366713641084616
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:1536:Y79hJ78bsmPOC5lhtb5FGNk4wZO+cWK4orE3HazVvon6BK2s6th:YpL78XPOCN1GeOUKdebIKfS
                                                                                                                                                                                                                            MD5:95FD4F27F82A9E4D6E2A53AF7A9096E6
                                                                                                                                                                                                                            SHA1:5F772C89901841AF1814C858359AC5FEB9BE3C24
                                                                                                                                                                                                                            SHA-256:98CD2F27906E4FD7FA7FBE0EC747BADEF710BCA736A1AC5EE883756F2185818C
                                                                                                                                                                                                                            SHA-512:6B2E2BA90B33F6658C903203317299057C83545D46549D468CDAA1D6F7BCE887310411B9BF6EEA9D19C214A2041BB5E14FD9395CC4E2FE9FC31AB03B88A75019
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>.d.z...z...z.....~...z.........}.....}...Y@..s....A..{....A..{...Richz...........................PE..d... [.\.........."..........L.................@....................................C.....`.................................................8p..P.......H....`.......R...E..........`#..8............................(..p............ ..`............................text...d........................... ..h.rdata....... ......................@..H.data...@....@.......$..............@....pdata.......`.......,..............@..HINIT.........p.......:.............. ....rsrc...H............J..............@..B.reloc...............P..............@..B................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):39920
                                                                                                                                                                                                                            Entropy (8bit):6.333649052940754
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:768:bCxLEO/+ApBG35KBOXZZoZmTD11a+uiExMFYQjdJxh63NOe:tCI46F1a+jExMFFjzv69
                                                                                                                                                                                                                            MD5:059E578D456043A8C3B76EC365B375F3
                                                                                                                                                                                                                            SHA1:42189B6A1B8C736397113BFC2283F5E1E1A44E8E
                                                                                                                                                                                                                            SHA-256:A0170CF78105CE757E0549D79E4AE7C412240E8B81D262A24D76A047F181F881
                                                                                                                                                                                                                            SHA-512:99E6B6AF018D0E3509D9DBE00301A7D5D6645A2070A8144ACFF04842F8BBACCD81E7651578D08F47639CD2B7D00EB64ACDDFA8725BCE9A073580B7FCF7964E6A
                                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~..[...[...[....w..Z....w..^...[...m....w.._....w..^.../t..Q.../t..Z.../t..Z...Rich[...........................PE..d......].........."......Z.....................@....................................P.....`A....................................................<.......X....p..H....x...#...........R..8............................S...............P...............................text...W>.......@.................. ..h.rdata..|....P.......D..............@..H.data........`.......P..............@....pdata..H....p.......R..............@..HPAGE.................V.............. ..`INIT.................d.............. ..b.rsrc...X............p..............@..B.reloc...............v..............@..B................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):1835008
                                                                                                                                                                                                                            Entropy (8bit):4.421845928266742
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:6144:DSvfpi6ceLP/9skLmb0OTCWSPHaJG8nAgeMZMMhA2fX4WABlEnNp0uhiTw:OvloTCW+EZMM6DFyb03w
                                                                                                                                                                                                                            MD5:3A3B3E3B66C8510FC3C2F8670EE728C7
                                                                                                                                                                                                                            SHA1:CE2DC17217ACC2B9D887925D10D1BBA862975116
                                                                                                                                                                                                                            SHA-256:7CAA29D6931326E5D6607A55EDB339E7B3447FDE1B008EB3E5162A04CE407174
                                                                                                                                                                                                                            SHA-512:F7B72849988B0DB0F22896186D2D6881A8D137CBDBF38796C8A92DEFD9C0E563ABBD9ABECACC5E97EB49F4D72FFA46EA0254E14719AA7708AE2D52BA22772251
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..an..................................................................................................................................................................................................................................................................................................................................................U........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                            Process:C:\Program Files\FastestVPN\subinacl.exe
                                                                                                                                                                                                                            File Type:ASCII text
                                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                                            Size (bytes):133
                                                                                                                                                                                                                            Entropy (8bit):4.004784065185313
                                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                                            SSDEEP:3:E8Hu/FvfVFcLaNKB4z/F/eAFFXx26LX/FFVbQAtbR91q:E2u/F8La3FGgy6L1bVDq
                                                                                                                                                                                                                            MD5:CE8AE87D7F83FA032F2A60AB0B8F0FE4
                                                                                                                                                                                                                            SHA1:203E8416D17D3A9E03509009A8F20F94C51C0381
                                                                                                                                                                                                                            SHA-256:F3617B3A17F48864D33A4C32D4F9AE862B23E07F35504C8D4DBE79AC589D395D
                                                                                                                                                                                                                            SHA-512:091E97EA19CCF4D6870F8EA861DCCC0F87E4928AC39C64A2AA1085C94EAE5F6707919A18FB3A56EE94F7483950F34128E7E8D321129F810C0847F3493F269682
                                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                                            Preview:.Elapsed Time: 00 00:00:00.Done: 1, Modified 1, Failed 0, Syntax errors 0.Last Done : FastestVPNService.
                                                                                                                                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                            Entropy (8bit):7.993161668226584
                                                                                                                                                                                                                            TrID:
                                                                                                                                                                                                                            • Win32 Executable (generic) a (10002005/4) 98.45%
                                                                                                                                                                                                                            • Inno Setup installer (109748/4) 1.08%
                                                                                                                                                                                                                            • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                                                                                                                                                                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                            File name:PVUfopbGfc.exe
                                                                                                                                                                                                                            File size:21'250'384 bytes
                                                                                                                                                                                                                            MD5:249ed615e8b43896fffd3cb3755c7a0a
                                                                                                                                                                                                                            SHA1:1b28a72f6746ad76f7b25ab767ce7b775282fbeb
                                                                                                                                                                                                                            SHA256:402aacbb8dc07d96733eee2292f709d89d65efbe82d55e0dd4b7764cdde287b5
                                                                                                                                                                                                                            SHA512:6a08ab47a7bc99175b547bf74715f9ff95de4c4517cb734c7f1e0588de77edb2220bb229e4f253accdfe89a7ca13a956a7188feeb5f01d5587baee85da1cbbd7
                                                                                                                                                                                                                            SSDEEP:393216:B6EKDC4ast7NVuy0G/ZDJG4x6gm+T8fIXno94qqgQYpS9R0W/LVuq1Z:kEKDCFe7MQJG4sgm+Tdoq6QY09Cu
                                                                                                                                                                                                                            TLSH:31273323B2C7E03EF1592B7245B3906864F76E51A522BD538AF4A46CCF354621E3F70A
                                                                                                                                                                                                                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                                                                                                                                            Icon Hash:701e0760791c0641
                                                                                                                                                                                                                            Entrypoint:0x4a83bc
                                                                                                                                                                                                                            Entrypoint Section:.itext
                                                                                                                                                                                                                            Digitally signed:true
                                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                                            Subsystem:windows gui
                                                                                                                                                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                            Time Stamp:0x666711EF [Mon Jun 10 14:47:11 2024 UTC]
                                                                                                                                                                                                                            TLS Callbacks:
                                                                                                                                                                                                                            CLR (.Net) Version:
                                                                                                                                                                                                                            OS Version Major:6
                                                                                                                                                                                                                            OS Version Minor:1
                                                                                                                                                                                                                            File Version Major:6
                                                                                                                                                                                                                            File Version Minor:1
                                                                                                                                                                                                                            Subsystem Version Major:6
                                                                                                                                                                                                                            Subsystem Version Minor:1
                                                                                                                                                                                                                            Import Hash:40ab50289f7ef5fae60801f88d4541fc
                                                                                                                                                                                                                            Signature Valid:true
                                                                                                                                                                                                                            Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                                                                                                                                                                                                                            Signature Validation Error:The operation completed successfully
                                                                                                                                                                                                                            Error Number:0
                                                                                                                                                                                                                            Not Before, Not After
                                                                                                                                                                                                                            • 15/01/2024 21:45:41 14/01/2025 21:45:41
                                                                                                                                                                                                                            Subject Chain
                                                                                                                                                                                                                            • OID.1.3.6.1.4.1.311.60.2.1.3=CA, OID.2.5.4.15=Private Organization, CN=Acira Consulting Inc., SERIALNUMBER=987024-5, O=Acira Consulting Inc., L=Mississauga, S=Ontario, C=CA
                                                                                                                                                                                                                            Version:3
                                                                                                                                                                                                                            Thumbprint MD5:4C9BC68042EB932BDCEC05026258C237
                                                                                                                                                                                                                            Thumbprint SHA-1:A70AB688FF0A7C3A22B030FBFFA8B56DC31F650A
                                                                                                                                                                                                                            Thumbprint SHA-256:49EB14C9EFDE16BD0546A80F058C7D10871ADACFD3B550A4F7007080377DA3BA
                                                                                                                                                                                                                            Serial:748A88467D46DF98B5246AFC4F5EEC64
                                                                                                                                                                                                                            Instruction
                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                            mov ebp, esp
                                                                                                                                                                                                                            add esp, FFFFFFA4h
                                                                                                                                                                                                                            push ebx
                                                                                                                                                                                                                            push esi
                                                                                                                                                                                                                            push edi
                                                                                                                                                                                                                            xor eax, eax
                                                                                                                                                                                                                            mov dword ptr [ebp-3Ch], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-40h], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-5Ch], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-30h], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-38h], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-34h], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-2Ch], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-28h], eax
                                                                                                                                                                                                                            mov dword ptr [ebp-14h], eax
                                                                                                                                                                                                                            mov eax, 004A2EBCh
                                                                                                                                                                                                                            call 00007FDAD5160065h
                                                                                                                                                                                                                            xor eax, eax
                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                            push 004A8AC1h
                                                                                                                                                                                                                            push dword ptr fs:[eax]
                                                                                                                                                                                                                            mov dword ptr fs:[eax], esp
                                                                                                                                                                                                                            xor edx, edx
                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                            push 004A8A7Bh
                                                                                                                                                                                                                            push dword ptr fs:[edx]
                                                                                                                                                                                                                            mov dword ptr fs:[edx], esp
                                                                                                                                                                                                                            mov eax, dword ptr [004B0634h]
                                                                                                                                                                                                                            call 00007FDAD51F19EBh
                                                                                                                                                                                                                            call 00007FDAD51F153Eh
                                                                                                                                                                                                                            lea edx, dword ptr [ebp-14h]
                                                                                                                                                                                                                            xor eax, eax
                                                                                                                                                                                                                            call 00007FDAD51EC218h
                                                                                                                                                                                                                            mov edx, dword ptr [ebp-14h]
                                                                                                                                                                                                                            mov eax, 004B41F4h
                                                                                                                                                                                                                            call 00007FDAD515A113h
                                                                                                                                                                                                                            push 00000002h
                                                                                                                                                                                                                            push 00000000h
                                                                                                                                                                                                                            push 00000001h
                                                                                                                                                                                                                            mov ecx, dword ptr [004B41F4h]
                                                                                                                                                                                                                            mov dl, 01h
                                                                                                                                                                                                                            mov eax, dword ptr [0049CD14h]
                                                                                                                                                                                                                            call 00007FDAD51ED543h
                                                                                                                                                                                                                            mov dword ptr [004B41F8h], eax
                                                                                                                                                                                                                            xor edx, edx
                                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                                            push 004A8A27h
                                                                                                                                                                                                                            push dword ptr fs:[edx]
                                                                                                                                                                                                                            mov dword ptr fs:[edx], esp
                                                                                                                                                                                                                            call 00007FDAD51F1A73h
                                                                                                                                                                                                                            mov dword ptr [004B4200h], eax
                                                                                                                                                                                                                            mov eax, dword ptr [004B4200h]
                                                                                                                                                                                                                            cmp dword ptr [eax+0Ch], 01h
                                                                                                                                                                                                                            jne 00007FDAD51F875Ah
                                                                                                                                                                                                                            mov eax, dword ptr [004B4200h]
                                                                                                                                                                                                                            mov edx, 00000028h
                                                                                                                                                                                                                            call 00007FDAD51EDE38h
                                                                                                                                                                                                                            mov edx, dword ptr [004B4200h]
                                                                                                                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0xb70000x71.edata
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb50000xfec.idata
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x7088.rsrc
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x1441b000x2650
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0xb90000x18.rdata
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0xb52d40x25c.idata
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb60000x1a4.didata
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                            .text0x10000xa568c0xa5800b889d302f6fc48a904de33d8d947ae80False0.3620185045317221data6.377190161826806IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                            .itext0xa70000x1b640x1c00588dd0a8ab499300d3701cbd11b017d9False0.548828125data6.109264411030635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                            .data0xa90000x38380x3a005c0c76e77aef52ebc6702430837ccb6eFalse0.35338092672413796data4.95916338709992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                            .bss0xad0000x72580x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                            .idata0xb50000xfec0x1000627340dff539ef99048969aa4824fb2dFalse0.380615234375data5.020404933181373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                            .didata0xb60000x1a40x200fd11c1109737963cc6cb7258063abfd6False0.34765625data2.729290535217263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                            .edata0xb70000x710x2007de8ca0c7a61668a728fd3a88dc0942dFalse0.1796875data1.305578535725827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                            .tls0xb80000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                            .rdata0xb90000x5d0x200d84006640084dc9f74a07c2ff9c7d656False0.189453125data1.3892750148744617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                            .rsrc0xba0000x70880x720065ba6bd3dcb2346eab195c2e7d1302ffFalse0.2584635416666667data4.423029369973584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                            RT_ICON0xba4980x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3980496453900709
                                                                                                                                                                                                                            RT_ICON0xba9000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.274155722326454
                                                                                                                                                                                                                            RT_ICON0xbb9a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.16514522821576763
                                                                                                                                                                                                                            RT_STRING0xbdf500x3f8data0.3198818897637795
                                                                                                                                                                                                                            RT_STRING0xbe3480x2dcdata0.36475409836065575
                                                                                                                                                                                                                            RT_STRING0xbe6240x430data0.40578358208955223
                                                                                                                                                                                                                            RT_STRING0xbea540x44cdata0.38636363636363635
                                                                                                                                                                                                                            RT_STRING0xbeea00x2d4data0.39226519337016574
                                                                                                                                                                                                                            RT_STRING0xbf1740xb8data0.6467391304347826
                                                                                                                                                                                                                            RT_STRING0xbf22c0x9cdata0.6410256410256411
                                                                                                                                                                                                                            RT_STRING0xbf2c80x374data0.4230769230769231
                                                                                                                                                                                                                            RT_STRING0xbf63c0x398data0.3358695652173913
                                                                                                                                                                                                                            RT_STRING0xbf9d40x368data0.3795871559633027
                                                                                                                                                                                                                            RT_STRING0xbfd3c0x2a4data0.4275147928994083
                                                                                                                                                                                                                            RT_RCDATA0xbffe00x10data1.5
                                                                                                                                                                                                                            RT_RCDATA0xbfff00x310data0.6173469387755102
                                                                                                                                                                                                                            RT_RCDATA0xc03000x2cdata1.1363636363636365
                                                                                                                                                                                                                            RT_GROUP_ICON0xc032c0x30dataEnglishUnited States0.9166666666666666
                                                                                                                                                                                                                            RT_VERSION0xc035c0x584dataEnglishUnited States0.25
                                                                                                                                                                                                                            RT_MANIFEST0xc08e00x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                                                                                                                                                                                                            DLLImport
                                                                                                                                                                                                                            kernel32.dllGetACP, GetExitCodeProcess, CloseHandle, LocalFree, SizeofResource, VirtualProtect, QueryPerformanceFrequency, VirtualFree, GetFullPathNameW, GetProcessHeap, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVolumeInformationW, GetVersion, GetDriveTypeW, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetCommandLineW, GetSystemInfo, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                                                                                                                                                                                            comctl32.dllInitCommonControls
                                                                                                                                                                                                                            user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                                                                                                                                                                                            oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                                                                                                                                                                                            advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, EqualSid, RegQueryValueExW, GetTokenInformation, ConvertSidToStringSidW, RegCloseKey
                                                                                                                                                                                                                            NameOrdinalAddress
                                                                                                                                                                                                                            __dbk_fcall_wrapper20x40fc10
                                                                                                                                                                                                                            dbkFCallWrapperAddr10x4b063c
                                                                                                                                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                            EnglishUnited States
                                                                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.674474955 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.674525976 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.674599886 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.683070898 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.683105946 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.171114922 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.171288013 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.249731064 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.249766111 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.250065088 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.290530920 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.411041975 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.455404997 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.512015104 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.553369045 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.555679083 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:54.555713892 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.052865028 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053128004 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053165913 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053196907 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053196907 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053220034 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053236961 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053666115 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053718090 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053725004 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053939104 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053988934 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.053996086 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.057722092 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.057760954 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.057780981 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.057790041 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.057837963 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145478964 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145612001 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145663023 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145698071 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145896912 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145924091 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145941019 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.145956039 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146132946 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146236897 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146447897 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146497011 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146503925 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146516085 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146554947 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.146569967 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147104979 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147161007 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147177935 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147376060 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147411108 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147459030 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147473097 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147517920 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147772074 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147809029 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147857904 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.147870064 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.148266077 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.148296118 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.148339033 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.148355007 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.148396969 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.148756981 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.189857960 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.189883947 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.237859011 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.238476038 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.238697052 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.238729954 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.238780022 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.238799095 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.238838911 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239221096 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239231110 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239280939 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239573956 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239581108 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239624977 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239629030 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239687920 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239697933 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.239742994 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.240509987 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.240540028 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.240585089 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.240595102 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.240629911 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.240648031 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.241369009 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.241391897 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.241460085 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.241477966 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.241492987 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.241537094 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.242002010 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.242062092 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.242980957 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243017912 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243066072 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243078947 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243097067 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243890047 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243923903 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243949890 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243952036 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.243963957 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.244007111 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.244030952 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.244765997 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.244833946 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.331114054 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.331201077 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.331336021 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.331404924 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.331970930 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332004070 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332032919 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332045078 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332062006 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332094908 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332845926 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332881927 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332910061 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332917929 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332951069 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.332967997 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.333638906 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.333707094 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.333765984 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.333869934 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.334642887 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.334676027 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.334701061 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.334708929 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.334738016 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.334754944 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.335582972 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.335635900 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.335664988 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.335669994 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.335700989 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.335721016 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.336442947 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.336476088 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.336505890 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.336512089 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.336544037 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.336563110 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.337382078 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.337416887 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.337455034 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.337460995 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.337491035 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.337507963 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.338336945 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.338367939 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.338392019 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.338397980 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.338426113 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.338443995 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.339015961 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.339073896 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.423629045 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.423718929 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.423762083 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.423825026 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424063921 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424117088 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424725056 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424771070 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424782038 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424793959 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.424829960 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.425491095 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.425528049 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.425556898 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.425569057 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.425591946 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.427464962 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.427504063 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.427535057 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.427552938 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.427567959 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428241968 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428402901 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428428888 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428459883 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428467989 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428498983 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.428515911 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.430087090 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.430121899 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.430150986 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.430166960 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.430191994 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.431703091 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.431726933 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.431772947 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.431786060 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.431843996 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.433598042 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.433624983 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.433679104 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.433691025 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.433703899 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.434492111 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.434514046 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.434547901 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.434561968 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.434582949 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.489845037 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.516868114 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.516892910 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.516954899 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.516972065 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.517004967 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.517026901 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.518034935 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.518053055 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.518135071 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.518155098 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.518196106 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.519733906 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.519754887 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.519820929 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.519843102 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.519860029 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.520004034 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.521491051 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.521507978 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.521558046 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.521574974 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.521590948 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.521621943 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.523221970 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.523283958 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.523287058 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.523296118 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.523339987 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.524005890 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.524025917 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.524090052 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.524101019 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.524142981 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.525774002 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.525789976 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.525846958 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.525867939 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.525908947 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.526702881 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.526719093 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.526838064 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.526845932 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.526949883 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.609452009 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.609477997 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.609586000 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.609610081 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.609647989 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.610739946 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.610759974 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.610831976 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.610836983 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.610866070 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.610886097 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.611669064 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.611686945 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.611753941 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.611759901 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.611825943 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.613567114 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.613584042 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.613646030 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.613653898 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.613713026 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.614582062 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.614600897 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.614661932 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.614667892 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.614708900 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.615544081 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.615561962 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.615617037 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.615623951 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.615662098 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.617290974 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.617311954 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.617342949 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.617350101 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.617378950 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.617420912 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.618170023 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.618185997 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.618240118 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.618247032 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.618295908 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.701817989 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.701847076 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.701915026 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.701941013 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.701994896 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.702959061 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.702976942 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703037024 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703042984 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703088999 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703836918 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703857899 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703934908 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703941107 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.703982115 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.705552101 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.705570936 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.705641031 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.705648899 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.705677032 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.705696106 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.706516981 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.706535101 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.706598997 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.706605911 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.706654072 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.707515955 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.707534075 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.707566977 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.707575083 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.707602024 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.707628012 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.708522081 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.708539009 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.708614111 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.708620071 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.708690882 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.709316969 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.709335089 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.709366083 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.709398985 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.709405899 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.709434986 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.761671066 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.794562101 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.794584990 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.794702053 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.794735909 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.794785976 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.795511961 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.795527935 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.795572996 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.795581102 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.795612097 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.795629025 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.796402931 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.796416998 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.796472073 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.796479940 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.796515942 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.796533108 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.797611952 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.797627926 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.797682047 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.797689915 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.797728062 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.798551083 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.798567057 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.798630953 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.798639059 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.798671007 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.798683882 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.799489021 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.799505949 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.799582958 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.799591064 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.799642086 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.800394058 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.800409079 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.800463915 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.800471067 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.800713062 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.801338911 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.801356077 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.801419020 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.801426888 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.801481009 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887198925 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887223959 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887340069 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887363911 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887408972 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887938976 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.887959003 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.888016939 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.888024092 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.888056993 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.888923883 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.888946056 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889014959 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889019966 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889055967 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889482975 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889498949 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889580965 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889586926 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.889628887 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.890335083 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.890352011 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.890425920 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.890431881 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.890469074 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.891298056 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.891313076 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.891359091 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.891365051 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.891395092 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.891413927 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.892262936 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.892285109 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.892340899 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.892347097 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.892385006 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.893116951 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.893132925 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.893194914 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.893202066 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.893240929 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.893630981 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.979845047 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.979865074 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.979943991 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.979963064 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.980004072 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.980572939 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.980590105 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.980645895 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.980652094 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.980686903 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.981669903 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.981684923 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.981759071 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.981765032 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.981812000 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982223988 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982240915 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982275963 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982281923 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982323885 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982956886 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.982970953 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983028889 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983035088 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983072042 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983894110 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983912945 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983942986 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983951092 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983957052 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983993053 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.983999014 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.984038115 CEST44349734104.22.21.170192.168.2.5
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.984174013 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            Oct 3, 2024 10:29:55.988214016 CEST49734443192.168.2.5104.22.21.170
                                                                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.628762960 CEST4967553192.168.2.51.1.1.1
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.638720036 CEST53496751.1.1.1192.168.2.5
                                                                                                                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.628762960 CEST192.168.2.51.1.1.10x379aStandard query (0)api.fastestvpn.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                            Oct 3, 2024 10:29:44.884237051 CEST1.1.1.1192.168.2.50x15deNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                            Oct 3, 2024 10:29:44.884237051 CEST1.1.1.1192.168.2.50x15deNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.638720036 CEST1.1.1.1192.168.2.50x379aNo error (0)api.fastestvpn.com104.22.21.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.638720036 CEST1.1.1.1192.168.2.50x379aNo error (0)api.fastestvpn.com172.67.39.187A (IP address)IN (0x0001)false
                                                                                                                                                                                                                            Oct 3, 2024 10:29:53.638720036 CEST1.1.1.1192.168.2.50x379aNo error (0)api.fastestvpn.com104.22.20.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                            • api.fastestvpn.com
                                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                            0192.168.2.549734104.22.21.1704436020C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                                            2024-10-03 08:29:54 UTC258OUTPOST /v2/authenticate HTTP/1.1
                                                                                                                                                                                                                            xplatform: windows
                                                                                                                                                                                                                            xplatformtoken: _1032024043022
                                                                                                                                                                                                                            Content-Type: application/json; charset=UTF-8
                                                                                                                                                                                                                            Host: api.fastestvpn.com
                                                                                                                                                                                                                            Content-Length: 104
                                                                                                                                                                                                                            Expect: 100-continue
                                                                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                                            2024-10-03 08:29:54 UTC25INHTTP/1.1 100 Continue
                                                                                                                                                                                                                            2024-10-03 08:29:54 UTC104OUTData Raw: 7b 22 65 6d 61 69 6c 22 3a 6e 75 6c 6c 2c 22 70 61 73 73 77 6f 72 64 22 3a 6e 75 6c 6c 2c 22 70 6c 61 74 66 6f 72 6d 22 3a 22 77 69 6e 64 6f 77 73 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 57 69 6e 64 6f 77 73 20 31 30 20 45 6e 74 65 72 70 72 69 73 65 5f 32 32 48 32 5f 31 39 30 34 35 22 2c 22 64 65 76 22 3a 31 7d
                                                                                                                                                                                                                            Data Ascii: {"email":null,"password":null,"platform":"windows","version":"Windows 10 Enterprise_22H2_19045","dev":1}
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INHTTP/1.1 200 OK
                                                                                                                                                                                                                            Date: Thu, 03 Oct 2024 08:29:55 GMT
                                                                                                                                                                                                                            Content-Type: application/json
                                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                                            Cache-Control: no-cache, private
                                                                                                                                                                                                                            x-ratelimit-limit: 30
                                                                                                                                                                                                                            x-ratelimit-remaining: 29
                                                                                                                                                                                                                            access-control-allow-origin: *
                                                                                                                                                                                                                            CF-Cache-Status: DYNAMIC
                                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                                            CF-RAY: 8ccb912f6edf8c83-EWR
                                                                                                                                                                                                                            7e50
                                                                                                                                                                                                                            {"servers":[{"name":"Servers","servers":[{"id":3,"continent":"Europe","country":"France","state":"Paris","city":"Paris","name":"France","server_name":"Paris","is_fav":false,"dns":"fr.jumptoserver.com","iso":"FR","country_sort":1000,"lt":"48.8714","lg":"2.32141","ip":"146.70.40.99","address":"60 Rue de Rivoli, 75004 Paris, France","port":4443,"protocol":"UDP","ipsec":"","remote_id":null,"is_trial":false,"active":true,"flag":"https:\/\/fastestvpn.com\/flags\/fr.png","is_favourited":false,"connection_count":62,"wg_key":"658QxufMbjOTmB61Z7f+c7Rjg7oqWLnepTalqBERjF0=","enable":1,"streaming":"0","dvpn":"0","is_p2p":"0"},{"id":4,"continent":"Europe","country":"France","state":"Paris","city":"Paris","name":"France","server_name":"Paris","is_fav":false,"dns":"fr.jumptoserver.com","iso":"FR","country_sort":1000,"lt":"48.8714","lg":"2.32141","ip":"146.70.40.99","address":"60 Rue de Rivoli, 75004 Paris, France","port":4443,"protocol":"TCP","ipsec":"","remote_id":null,"is_trial":false,"active":true,"flag":"https:\/\/fastes [TRUNCATED]
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 61 67 73 5c 2f 66 72 2e 70 6e 67 22 2c 22 69 73 5f 66 61 76 6f 75 72 69 74 65 64 22 3a 66 61 6c 73 65 2c 22 63 6f 6e 6e 65 63 74 69 6f 6e 5f 63 6f 75 6e 74 22 3a 34 36 2c 22 77 67 5f 6b 65 79 22 3a 22 36 35 38 51 78 75 66 4d 62 6a 4f 54 6d 42 36 31 5a 37 66 2b 63 37 52 6a 67 37 6f 71 57 4c 6e 65 70 54 61 6c 71 42 45 52 6a 46 30 3d 22 2c 22 65 6e 61 62 6c 65 22 3a 31 2c 22 73 74 72 65 61 6d 69 6e 67 22 3a 22 30 22 2c 22 64 76 70 6e 22 3a 22 30 22 2c 22 69 73 5f 70 32 70 22 3a 22 30 22 7d 2c 7b 22 69 64 22 3a 35 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 45 75 72 6f 70 65 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 46 72 61 6e 63 65 22 2c 22 73 74 61 74 65 22 3a 22 50 61 72 69 73 22 2c 22 63 69 74 79 22 3a 22 50 61 72 69 73 22 2c 22 6e 61 6d 65 22 3a 22 46 72 61
                                                                                                                                                                                                                            Data Ascii: ags\/fr.png","is_favourited":false,"connection_count":46,"wg_key":"658QxufMbjOTmB61Z7f+c7Rjg7oqWLnepTalqBERjF0=","enable":1,"streaming":"0","dvpn":"0","is_p2p":"0"},{"id":5,"continent":"Europe","country":"France","state":"Paris","city":"Paris","name":"Fra
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 2c 22 63 6f 75 6e 74 72 79 22 3a 22 4e 65 74 68 65 72 6c 61 6e 64 73 22 2c 22 73 74 61 74 65 22 3a 22 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 22 2c 22 63 69 74 79 22 3a 6e 75 6c 6c 2c 22 6e 61 6d 65 22 3a 22 4e 65 74 68 65 72 6c 61 6e 64 73 20 31 22 2c 22 73 65 72 76 65 72 5f 6e 61 6d 65 22 3a 22 41 6d 73 74 65 72 64 61 6d 22 2c 22 69 73 5f 66 61 76 22 3a 66 61 6c 73 65 2c 22 64 6e 73 22 3a 22 6e 6c 2d 30 31 2e 6a 75 6d 70 74 6f 73 65 72 76 65 72 2e 63 6f 6d 22 2c 22 69 73 6f 22 3a 22 4e 4c 22 2c 22 63 6f 75 6e 74 72 79 5f 73 6f 72 74 22 3a 31 30 30 30 2c 22 6c 74 22 3a 22 35 31 2e 38 34 32 35 22 2c 22 6c 67 22 3a 22 35 2e 38 35 32 37 38 22 2c 22 69 70 22 3a 22 31 30 38 2e 31 38 31 2e 31 32 33 2e 37 34 22 2c 22 61 64 64 72 65 73 73 22 3a 22 41 6e 64 72 69
                                                                                                                                                                                                                            Data Ascii: ,"country":"Netherlands","state":"Noord-Holland","city":null,"name":"Netherlands 1","server_name":"Amsterdam","is_fav":false,"dns":"nl-01.jumptoserver.com","iso":"NL","country_sort":1000,"lt":"51.8425","lg":"5.85278","ip":"108.181.123.74","address":"Andri
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 6e 61 6d 65 22 3a 22 41 6d 73 74 65 72 64 61 6d 22 2c 22 69 73 5f 66 61 76 22 3a 66 61 6c 73 65 2c 22 64 6e 73 22 3a 22 6e 6c 2d 30 31 2e 6a 75 6d 70 74 6f 73 65 72 76 65 72 2e 63 6f 6d 22 2c 22 69 73 6f 22 3a 22 4e 4c 22 2c 22 63 6f 75 6e 74 72 79 5f 73 6f 72 74 22 3a 31 30 30 30 2c 22 6c 74 22 3a 22 35 31 2e 38 34 32 35 22 2c 22 6c 67 22 3a 22 35 2e 38 35 32 37 38 22 2c 22 69 70 22 3a 22 31 30 38 2e 31 38 31 2e 31 32 33 2e 37 34 22 2c 22 61 64 64 72 65 73 73 22 3a 22 53 70 75 69 73 74 72 61 61 74 20 31 33 34 61 66 64 2e 47 65 73 63 68 2e 2c 20 31 30 31 32 20 56 42 20 41 6d 73 74 65 72 64 61 6d 2c 20 4e 65 74 68 65 72 6c 61 6e 64 73 22 2c 22 70 6f 72 74 22 3a 34 34 34 33 2c 22 70 72 6f 74 6f 63 6f 6c 22 3a 22 55 44 50 22 2c 22 69 70 73 65 63 22 3a 22 22
                                                                                                                                                                                                                            Data Ascii: name":"Amsterdam","is_fav":false,"dns":"nl-01.jumptoserver.com","iso":"NL","country_sort":1000,"lt":"51.8425","lg":"5.85278","ip":"108.181.123.74","address":"Spuistraat 134afd.Gesch., 1012 VB Amsterdam, Netherlands","port":4443,"protocol":"UDP","ipsec":""
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 22 3a 22 39 35 2e 31 37 34 2e 36 34 2e 31 32 32 22 2c 22 61 64 64 72 65 73 73 22 3a 22 56 69 61 6c 65 20 64 65 6c 6c 61 20 56 65 6e 65 7a 69 61 20 47 69 75 6c 69 61 2c 20 31 30 2c 20 30 30 31 37 37 20 52 6f 6d 61 20 52 4d 2c 20 49 74 61 6c 79 22 2c 22 70 6f 72 74 22 3a 34 34 34 33 2c 22 70 72 6f 74 6f 63 6f 6c 22 3a 22 50 50 54 50 22 2c 22 69 70 73 65 63 22 3a 22 22 2c 22 72 65 6d 6f 74 65 5f 69 64 22 3a 6e 75 6c 6c 2c 22 69 73 5f 74 72 69 61 6c 22 3a 66 61 6c 73 65 2c 22 61 63 74 69 76 65 22 3a 74 72 75 65 2c 22 66 6c 61 67 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 66 61 73 74 65 73 74 76 70 6e 2e 63 6f 6d 5c 2f 66 6c 61 67 73 5c 2f 69 74 2e 70 6e 67 22 2c 22 69 73 5f 66 61 76 6f 75 72 69 74 65 64 22 3a 66 61 6c 73 65 2c 22 63 6f 6e 6e 65 63 74 69 6f 6e 5f
                                                                                                                                                                                                                            Data Ascii: ":"95.174.64.122","address":"Viale della Venezia Giulia, 10, 00177 Roma RM, Italy","port":4443,"protocol":"PPTP","ipsec":"","remote_id":null,"is_trial":false,"active":true,"flag":"https:\/\/fastestvpn.com\/flags\/it.png","is_favourited":false,"connection_
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 5f 74 72 69 61 6c 22 3a 66 61 6c 73 65 2c 22 61 63 74 69 76 65 22 3a 74 72 75 65 2c 22 66 6c 61 67 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 66 61 73 74 65 73 74 76 70 6e 2e 63 6f 6d 5c 2f 66 6c 61 67 73 5c 2f 69 74 2e 70 6e 67 22 2c 22 69 73 5f 66 61 76 6f 75 72 69 74 65 64 22 3a 66 61 6c 73 65 2c 22 63 6f 6e 6e 65 63 74 69 6f 6e 5f 63 6f 75 6e 74 22 3a 36 36 2c 22 77 67 5f 6b 65 79 22 3a 22 36 35 38 51 78 75 66 4d 62 6a 4f 54 6d 42 36 31 5a 37 66 2b 63 37 52 6a 67 37 6f 71 57 4c 6e 65 70 54 61 6c 71 42 45 52 6a 46 30 3d 22 2c 22 65 6e 61 62 6c 65 22 3a 31 2c 22 73 74 72 65 61 6d 69 6e 67 22 3a 22 30 22 2c 22 64 76 70 6e 22 3a 22 30 22 2c 22 69 73 5f 70 32 70 22 3a 22 30 22 7d 2c 7b 22 69 64 22 3a 31 37 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 45 75 72 6f
                                                                                                                                                                                                                            Data Ascii: _trial":false,"active":true,"flag":"https:\/\/fastestvpn.com\/flags\/it.png","is_favourited":false,"connection_count":66,"wg_key":"658QxufMbjOTmB61Z7f+c7Rjg7oqWLnepTalqBERjF0=","enable":1,"streaming":"0","dvpn":"0","is_p2p":"0"},{"id":17,"continent":"Euro
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 6c 71 42 45 52 6a 46 30 3d 22 2c 22 65 6e 61 62 6c 65 22 3a 31 2c 22 73 74 72 65 61 6d 69 6e 67 22 3a 22 30 22 2c 22 64 76 70 6e 22 3a 22 30 22 2c 22 69 73 5f 70 32 70 22 3a 22 30 22 7d 2c 7b 22 69 64 22 3a 31 39 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 45 75 72 6f 70 65 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 49 74 61 6c 79 22 2c 22 73 74 61 74 65 22 3a 22 4c 6f 6d 62 61 72 64 79 22 2c 22 63 69 74 79 22 3a 22 6d 69 6c 61 6e 22 2c 22 6e 61 6d 65 22 3a 22 49 74 61 6c 79 22 2c 22 73 65 72 76 65 72 5f 6e 61 6d 65 22 3a 22 4d 69 6c 61 6e 22 2c 22 69 73 5f 66 61 76 22 3a 66 61 6c 73 65 2c 22 64 6e 73 22 3a 22 69 74 2d 30 31 2e 6a 75 6d 70 74 6f 73 65 72 76 65 72 2e 63 6f 6d 22 2c 22 69 73 6f 22 3a 22 49 54 22 2c 22 63 6f 75 6e 74 72 79 5f 73 6f 72 74 22 3a 31
                                                                                                                                                                                                                            Data Ascii: lqBERjF0=","enable":1,"streaming":"0","dvpn":"0","is_p2p":"0"},{"id":19,"continent":"Europe","country":"Italy","state":"Lombardy","city":"milan","name":"Italy","server_name":"Milan","is_fav":false,"dns":"it-01.jumptoserver.com","iso":"IT","country_sort":1
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 22 2c 22 73 65 72 76 65 72 5f 6e 61 6d 65 22 3a 22 48 65 73 70 65 72 61 6e 67 65 22 2c 22 69 73 5f 66 61 76 22 3a 66 61 6c 73 65 2c 22 64 6e 73 22 3a 22 6c 75 78 31 2e 6a 75 6d 70 74 6f 73 65 72 76 65 72 2e 63 6f 6d 22 2c 22 69 73 6f 22 3a 22 4c 55 22 2c 22 63 6f 75 6e 74 72 79 5f 73 6f 72 74 22 3a 31 30 30 30 2c 22 6c 74 22 3a 22 34 39 2e 36 31 31 33 22 2c 22 6c 67 22 3a 22 36 2e 31 32 39 34 22 2c 22 69 70 22 3a 22 35 2e 32 35 33 2e 32 30 34 2e 34 33 22 2c 22 61 64 64 72 65 73 73 22 3a 22 31 20 52 75 65 20 50 61 75 6c 20 45 79 73 63 68 65 6e 2c 20 37 33 31 37 20 4d 5c 75 30 30 66 63 6c 6c 65 6e 64 6f 72 66 2c 20 4c 75 78 65 6d 62 6f 75 72 67 22 2c 22 70 6f 72 74 22 3a 34 34 34 33 2c 22 70 72 6f 74 6f 63 6f 6c 22 3a 22 49 4b 45 56 32 22 2c 22 69 70 73 65
                                                                                                                                                                                                                            Data Ascii: ","server_name":"Hesperange","is_fav":false,"dns":"lux1.jumptoserver.com","iso":"LU","country_sort":1000,"lt":"49.6113","lg":"6.1294","ip":"5.253.204.43","address":"1 Rue Paul Eyschen, 7317 M\u00fcllendorf, Luxembourg","port":4443,"protocol":"IKEV2","ipse
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 31 32 39 34 22 2c 22 69 70 22 3a 22 35 2e 32 35 33 2e 32 30 34 2e 34 33 22 2c 22 61 64 64 72 65 73 73 22 3a 22 31 20 52 75 65 20 50 61 75 6c 20 45 79 73 63 68 65 6e 2c 20 37 33 31 37 20 4d 5c 75 30 30 66 63 6c 6c 65 6e 64 6f 72 66 2c 20 4c 75 78 65 6d 62 6f 75 72 67 22 2c 22 70 6f 72 74 22 3a 34 34 34 33 2c 22 70 72 6f 74 6f 63 6f 6c 22 3a 22 55 44 50 22 2c 22 69 70 73 65 63 22 3a 22 22 2c 22 72 65 6d 6f 74 65 5f 69 64 22 3a 6e 75 6c 6c 2c 22 69 73 5f 74 72 69 61 6c 22 3a 66 61 6c 73 65 2c 22 61 63 74 69 76 65 22 3a 74 72 75 65 2c 22 66 6c 61 67 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 66 61 73 74 65 73 74 76 70 6e 2e 63 6f 6d 5c 2f 66 6c 61 67 73 5c 2f 6c 75 2e 70 6e 67 22 2c 22 69 73 5f 66 61 76 6f 75 72 69 74 65 64 22 3a 66 61 6c 73 65 2c 22 63 6f 6e 6e
                                                                                                                                                                                                                            Data Ascii: 1294","ip":"5.253.204.43","address":"1 Rue Paul Eyschen, 7317 M\u00fcllendorf, Luxembourg","port":4443,"protocol":"UDP","ipsec":"","remote_id":null,"is_trial":false,"active":true,"flag":"https:\/\/fastestvpn.com\/flags\/lu.png","is_favourited":false,"conn
                                                                                                                                                                                                                            2024-10-03 08:29:55 UTC1369INData Raw: 74 72 69 61 6c 22 3a 66 61 6c 73 65 2c 22 61 63 74 69 76 65 22 3a 74 72 75 65 2c 22 66 6c 61 67 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 66 61 73 74 65 73 74 76 70 6e 2e 63 6f 6d 5c 2f 66 6c 61 67 73 5c 2f 72 6f 2e 70 6e 67 22 2c 22 69 73 5f 66 61 76 6f 75 72 69 74 65 64 22 3a 66 61 6c 73 65 2c 22 63 6f 6e 6e 65 63 74 69 6f 6e 5f 63 6f 75 6e 74 22 3a 34 34 2c 22 77 67 5f 6b 65 79 22 3a 22 36 35 38 51 78 75 66 4d 62 6a 4f 54 6d 42 36 31 5a 37 66 2b 63 37 52 6a 67 37 6f 71 57 4c 6e 65 70 54 61 6c 71 42 45 52 6a 46 30 3d 22 2c 22 65 6e 61 62 6c 65 22 3a 31 2c 22 73 74 72 65 61 6d 69 6e 67 22 3a 22 30 22 2c 22 64 76 70 6e 22 3a 22 30 22 2c 22 69 73 5f 70 32 70 22 3a 22 30 22 7d 2c 7b 22 69 64 22 3a 33 36 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 45 75 72 6f 70
                                                                                                                                                                                                                            Data Ascii: trial":false,"active":true,"flag":"https:\/\/fastestvpn.com\/flags\/ro.png","is_favourited":false,"connection_count":44,"wg_key":"658QxufMbjOTmB61Z7f+c7Rjg7oqWLnepTalqBERjF0=","enable":1,"streaming":"0","dvpn":"0","is_p2p":"0"},{"id":36,"continent":"Europ


                                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                                            Target ID:0
                                                                                                                                                                                                                            Start time:04:28:57
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Users\user\Desktop\PVUfopbGfc.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Users\user\Desktop\PVUfopbGfc.exe"
                                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                                            File size:21'250'384 bytes
                                                                                                                                                                                                                            MD5 hash:249ED615E8B43896FFFD3CB3755C7A0A
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:Borland Delphi
                                                                                                                                                                                                                            Reputation:low
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:1
                                                                                                                                                                                                                            Start time:04:28:57
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\is-QNOJK.tmp\PVUfopbGfc.tmp" /SL5="$1046E,20382094,735744,C:\Users\user\Desktop\PVUfopbGfc.exe"
                                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                                            File size:3'045'888 bytes
                                                                                                                                                                                                                            MD5 hash:259E3EE4646FC251C3513EEF2683479F
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:Borland Delphi
                                                                                                                                                                                                                            Yara matches:
                                                                                                                                                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000003.2675219520.00000000054B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                            Reputation:low
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:5
                                                                                                                                                                                                                            Start time:04:29:27
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\driver\install_tap.bat""
                                                                                                                                                                                                                            Imagebase:0x7ff664950000
                                                                                                                                                                                                                            File size:289'792 bytes
                                                                                                                                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:6
                                                                                                                                                                                                                            Start time:04:29:27
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:7
                                                                                                                                                                                                                            Start time:04:29:27
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\reg.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
                                                                                                                                                                                                                            Imagebase:0x7ff6d0160000
                                                                                                                                                                                                                            File size:77'312 bytes
                                                                                                                                                                                                                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:moderate
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:8
                                                                                                                                                                                                                            Start time:04:29:27
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\find.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:find /i "x86"
                                                                                                                                                                                                                            Imagebase:0x7ff78ee60000
                                                                                                                                                                                                                            File size:17'920 bytes
                                                                                                                                                                                                                            MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:moderate
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:9
                                                                                                                                                                                                                            Start time:04:29:27
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c ver
                                                                                                                                                                                                                            Imagebase:0x7ff664950000
                                                                                                                                                                                                                            File size:289'792 bytes
                                                                                                                                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:10
                                                                                                                                                                                                                            Start time:04:29:27
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:tapinstall.exe remove tap0901
                                                                                                                                                                                                                            Imagebase:0x7ff70a9e0000
                                                                                                                                                                                                                            File size:507'728 bytes
                                                                                                                                                                                                                            MD5 hash:E313336C82EB265542664CC7A360C5FF
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:moderate
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:11
                                                                                                                                                                                                                            Start time:04:29:28
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:tapinstall.exe install OemVista.inf tap0901
                                                                                                                                                                                                                            Imagebase:0x7ff70a9e0000
                                                                                                                                                                                                                            File size:507'728 bytes
                                                                                                                                                                                                                            MD5 hash:E313336C82EB265542664CC7A360C5FF
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:moderate
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:12
                                                                                                                                                                                                                            Start time:04:29:29
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                                                                                                                                                                                                            Imagebase:0x7ff7e52b0000
                                                                                                                                                                                                                            File size:55'320 bytes
                                                                                                                                                                                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                            Target ID:13
                                                                                                                                                                                                                            Start time:04:29:29
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{d561b4bd-4963-934e-b2b1-0e0727e36250}\oemvista.inf" "9" "4d14a44ff" "0000000000000160" "WinSta0\Default" "0000000000000158" "208" "c:\program files\fastestvpn\resources\driver\windows10\amd64"
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:337'920 bytes
                                                                                                                                                                                                                            MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Reputation:moderate
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:14
                                                                                                                                                                                                                            Start time:04:29:30
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\drvinst.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:3beb73aff103cc24:tap0901.ndi:9.24.2.601:tap0901," "4d14a44ff" "0000000000000180"
                                                                                                                                                                                                                            Imagebase:0x7ff7bd6a0000
                                                                                                                                                                                                                            File size:337'920 bytes
                                                                                                                                                                                                                            MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:15
                                                                                                                                                                                                                            Start time:04:29:31
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc
                                                                                                                                                                                                                            Imagebase:0x7ff7e52b0000
                                                                                                                                                                                                                            File size:55'320 bytes
                                                                                                                                                                                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:16
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\FastestVPN\Resources\sp\install_sp.bat""
                                                                                                                                                                                                                            Imagebase:0x7ff664950000
                                                                                                                                                                                                                            File size:289'792 bytes
                                                                                                                                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:17
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:18
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\sc.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:sc stop fastestvpndriver
                                                                                                                                                                                                                            Imagebase:0x7ff746bb0000
                                                                                                                                                                                                                            File size:72'192 bytes
                                                                                                                                                                                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:19
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:20
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\reg.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:reg Query "HKLM\Hardware\Description\System\CentralProcessor\0"
                                                                                                                                                                                                                            Imagebase:0x7ff6d0160000
                                                                                                                                                                                                                            File size:77'312 bytes
                                                                                                                                                                                                                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:21
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\find.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:find /i "x86"
                                                                                                                                                                                                                            Imagebase:0x7ff78ee60000
                                                                                                                                                                                                                            File size:17'920 bytes
                                                                                                                                                                                                                            MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:22
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\reg.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion"
                                                                                                                                                                                                                            Imagebase:0x7ff6d0160000
                                                                                                                                                                                                                            File size:77'312 bytes
                                                                                                                                                                                                                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:23
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\find.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:find /i "Windows 7"
                                                                                                                                                                                                                            Imagebase:0x7ff78ee60000
                                                                                                                                                                                                                            File size:17'920 bytes
                                                                                                                                                                                                                            MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:24
                                                                                                                                                                                                                            Start time:04:29:33
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\xcopy.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:xcopy /y driver\windows8\amd64\fastestvpndriver.sys C:\Windows\system32\drivers
                                                                                                                                                                                                                            Imagebase:0x7ff7dd650000
                                                                                                                                                                                                                            File size:50'688 bytes
                                                                                                                                                                                                                            MD5 hash:39FBFD3AF58238C6F9D4D408C9251FF5
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:25
                                                                                                                                                                                                                            Start time:04:29:34
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:release\nfregdrv.exe -u fastestvpndriver
                                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                                            File size:61'064 bytes
                                                                                                                                                                                                                            MD5 hash:9333F583E2D32A47276DCEC7C2391FD2
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:26
                                                                                                                                                                                                                            Start time:04:29:34
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Resources\sp\release\nfregdrv.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:release\nfregdrv.exe fastestvpndriver
                                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                                            File size:61'064 bytes
                                                                                                                                                                                                                            MD5 hash:9333F583E2D32A47276DCEC7C2391FD2
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:27
                                                                                                                                                                                                                            Start time:04:29:34
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\sc.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:"C:\Windows\system32\sc.exe" stop FastestVPNService
                                                                                                                                                                                                                            Imagebase:0x7ff746bb0000
                                                                                                                                                                                                                            File size:72'192 bytes
                                                                                                                                                                                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:28
                                                                                                                                                                                                                            Start time:04:29:34
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:29
                                                                                                                                                                                                                            Start time:04:29:34
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --uninstall
                                                                                                                                                                                                                            Imagebase:0xe20000
                                                                                                                                                                                                                            File size:25'768 bytes
                                                                                                                                                                                                                            MD5 hash:22D4E4267DFE093E5E23C2F3D7741AA4
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:30
                                                                                                                                                                                                                            Start time:04:29:35
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                                                            Imagebase:0x7ff7e52b0000
                                                                                                                                                                                                                            File size:55'320 bytes
                                                                                                                                                                                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                            Target ID:31
                                                                                                                                                                                                                            Start time:04:29:36
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6276 -ip 6276
                                                                                                                                                                                                                            Imagebase:0x9c0000
                                                                                                                                                                                                                            File size:483'680 bytes
                                                                                                                                                                                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:32
                                                                                                                                                                                                                            Start time:04:29:36
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 1076
                                                                                                                                                                                                                            Imagebase:0x9c0000
                                                                                                                                                                                                                            File size:483'680 bytes
                                                                                                                                                                                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:33
                                                                                                                                                                                                                            Start time:04:29:37
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                            Imagebase:0x7ff7e52b0000
                                                                                                                                                                                                                            File size:55'320 bytes
                                                                                                                                                                                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                            Target ID:34
                                                                                                                                                                                                                            Start time:04:29:39
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\FastestVPN.exe" -autorun
                                                                                                                                                                                                                            Imagebase:0x8f0000
                                                                                                                                                                                                                            File size:2'059'432 bytes
                                                                                                                                                                                                                            MD5 hash:01CF6EF766C41BB2C99A2CCCDECC69C1
                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                            Target ID:35
                                                                                                                                                                                                                            Start time:04:29:41
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"powershell" -windowstyle hidden get-wmiobject Win32_ComputerSystemProduct | Select-Object -ExpandProperty UUID
                                                                                                                                                                                                                            Imagebase:0xc0000
                                                                                                                                                                                                                            File size:433'152 bytes
                                                                                                                                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:37
                                                                                                                                                                                                                            Start time:04:29:41
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:38
                                                                                                                                                                                                                            Start time:04:29:41
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                                                                                                                                            Imagebase:0x7ff7e52b0000
                                                                                                                                                                                                                            File size:55'320 bytes
                                                                                                                                                                                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                            Target ID:40
                                                                                                                                                                                                                            Start time:04:29:52
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\sc.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:"C:\Windows\system32\sc.exe" delete FastestVPNService
                                                                                                                                                                                                                            Imagebase:0x7ff746bb0000
                                                                                                                                                                                                                            File size:72'192 bytes
                                                                                                                                                                                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:41
                                                                                                                                                                                                                            Start time:04:29:52
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:42
                                                                                                                                                                                                                            Start time:04:29:52
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe" --install
                                                                                                                                                                                                                            Imagebase:0x480000
                                                                                                                                                                                                                            File size:25'768 bytes
                                                                                                                                                                                                                            MD5 hash:22D4E4267DFE093E5E23C2F3D7741AA4
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:43
                                                                                                                                                                                                                            Start time:04:29:54
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\subinacl.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\subinacl.exe" /service FastestVPNService /GRANT=everyone=TO
                                                                                                                                                                                                                            Imagebase:0x1000000
                                                                                                                                                                                                                            File size:301'224 bytes
                                                                                                                                                                                                                            MD5 hash:4798226EE22C513302EE57D3AA94398B
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:44
                                                                                                                                                                                                                            Start time:04:29:54
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:45
                                                                                                                                                                                                                            Start time:04:29:55
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\sc.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:"C:\Windows\system32\sc.exe" start FastestVPNService
                                                                                                                                                                                                                            Imagebase:0x7ff746bb0000
                                                                                                                                                                                                                            File size:72'192 bytes
                                                                                                                                                                                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:46
                                                                                                                                                                                                                            Start time:04:29:55
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:47
                                                                                                                                                                                                                            Start time:04:29:55
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\Service\FastestVPN.WindowsService.exe"
                                                                                                                                                                                                                            Imagebase:0xc10000
                                                                                                                                                                                                                            File size:25'768 bytes
                                                                                                                                                                                                                            MD5 hash:22D4E4267DFE093E5E23C2F3D7741AA4
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:false

                                                                                                                                                                                                                            Target ID:48
                                                                                                                                                                                                                            Start time:04:29:55
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\Resources\ComDebug.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\Resources\ComDebug.exe"
                                                                                                                                                                                                                            Imagebase:0x7ff6623b0000
                                                                                                                                                                                                                            File size:256'912 bytes
                                                                                                                                                                                                                            MD5 hash:850A43E323656B86AE665D8B4FD71369
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:49
                                                                                                                                                                                                                            Start time:04:29:57
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\dllhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                                                                            Imagebase:0x7ff669820000
                                                                                                                                                                                                                            File size:21'312 bytes
                                                                                                                                                                                                                            MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                                                                                                                                                                                            Has elevated privileges:false
                                                                                                                                                                                                                            Has administrator privileges:false
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:50
                                                                                                                                                                                                                            Start time:04:30:00
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                            Imagebase:0x1080000
                                                                                                                                                                                                                            File size:82'432 bytes
                                                                                                                                                                                                                            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:51
                                                                                                                                                                                                                            Start time:04:30:00
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:52
                                                                                                                                                                                                                            Start time:04:30:00
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Program Files\FastestVPN\FastestVPN.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:"C:\Program Files\FastestVPN\FastestVPN.exe"
                                                                                                                                                                                                                            Imagebase:0x200000
                                                                                                                                                                                                                            File size:2'059'432 bytes
                                                                                                                                                                                                                            MD5 hash:01CF6EF766C41BB2C99A2CCCDECC69C1
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Target ID:53
                                                                                                                                                                                                                            Start time:04:30:11
                                                                                                                                                                                                                            Start date:03/10/2024
                                                                                                                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Launcher.exe
                                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                                            Commandline:C:\Users\user\AppData\Local\Temp\Launcher.exe
                                                                                                                                                                                                                            Imagebase:0x3a0000
                                                                                                                                                                                                                            File size:77'928 bytes
                                                                                                                                                                                                                            MD5 hash:F43C6B629BAAAAEE1E7FE095A8821631
                                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                                            Reset < >

                                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                                              Execution Coverage:1.5%
                                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                              Signature Coverage:24.8%
                                                                                                                                                                                                                              Total number of Nodes:214
                                                                                                                                                                                                                              Total number of Limit Nodes:4
                                                                                                                                                                                                                              execution_graph 33672 7ff70aa1154c 33673 7ff70aa11569 GetModuleHandleW 33672->33673 33674 7ff70aa115b3 33672->33674 33673->33674 33678 7ff70aa11576 33673->33678 33682 7ff70aa11340 33674->33682 33677 7ff70aa115f5 33678->33674 33696 7ff70aa116e4 GetModuleHandleExW 33678->33696 33680 7ff70aa11607 33702 7ff70aa21c48 EnterCriticalSection 33682->33702 33684 7ff70aa1135c 33685 7ff70aa11434 14 API calls 33684->33685 33686 7ff70aa11365 33685->33686 33687 7ff70aa21ca8 _onexit LeaveCriticalSection 33686->33687 33688 7ff70aa1136d 33687->33688 33688->33677 33689 7ff70aa11608 33688->33689 33703 7ff70aa21f40 33689->33703 33692 7ff70aa11642 33694 7ff70aa116e4 3 API calls 33692->33694 33693 7ff70aa11631 GetCurrentProcess TerminateProcess 33693->33692 33695 7ff70aa11649 ExitProcess 33694->33695 33697 7ff70aa11729 33696->33697 33698 7ff70aa1170a GetProcAddress 33696->33698 33700 7ff70aa11739 33697->33700 33701 7ff70aa11733 FreeLibrary 33697->33701 33698->33697 33699 7ff70aa11721 33698->33699 33699->33697 33700->33674 33701->33700 33704 7ff70aa21f5e 33703->33704 33705 7ff70aa11615 33703->33705 33707 7ff70aa18634 33704->33707 33705->33692 33705->33693 33710 7ff70aa181a8 33707->33710 33711 7ff70aa18209 33710->33711 33718 7ff70aa18204 try_get_module 33710->33718 33711->33705 33712 7ff70aa182ec 33712->33711 33715 7ff70aa182fa GetProcAddress 33712->33715 33713 7ff70aa18238 LoadLibraryExW 33714 7ff70aa18259 GetLastError 33713->33714 33713->33718 33714->33718 33716 7ff70aa1830b 33715->33716 33716->33711 33717 7ff70aa182d1 FreeLibrary 33717->33718 33718->33711 33718->33712 33718->33713 33718->33717 33719 7ff70aa18293 LoadLibraryExW 33718->33719 33719->33718 33720 7ff70a9e789c 33743 7ff70a9e8414 33720->33743 33725 7ff70a9e78d1 __scrt_acquire_startup_lock 33728 7ff70a9e7a11 33725->33728 33734 7ff70a9e78ef __scrt_release_startup_lock 33725->33734 33726 7ff70a9e7a07 33792 7ff70a9e8550 7 API calls 2 library calls 33726->33792 33793 7ff70a9e8550 7 API calls 2 library calls 33728->33793 33730 7ff70a9e7914 33731 7ff70a9e7a1c _purecall 33732 7ff70a9e799a 33754 7ff70aa11234 33732->33754 33734->33730 33734->33732 33789 7ff70aa11788 37 API calls __InternalCxxFrameHandler 33734->33789 33736 7ff70a9e799f 33760 7ff70a9e52e0 33736->33760 33740 7ff70a9e79c3 33740->33731 33791 7ff70a9e82dc 8 API calls __vcrt_uninitialize 33740->33791 33742 7ff70a9e79da 33742->33730 33744 7ff70a9e78a5 33743->33744 33745 7ff70a9e8437 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 33743->33745 33746 7ff70a9e8124 33744->33746 33745->33744 33747 7ff70a9e8146 33746->33747 33794 7ff70a9e9184 33747->33794 33750 7ff70a9e78c9 33750->33725 33750->33726 33755 7ff70aa11244 33754->33755 33758 7ff70aa11259 33754->33758 33755->33758 33843 7ff70aa10930 34 API calls Concurrency::details::_Concurrent_queue_iterator_base_v4::~_Concurrent_queue_iterator_base_v4 33755->33843 33757 7ff70aa11262 33757->33758 33844 7ff70aa10d90 15 API calls 3 library calls 33757->33844 33758->33736 33761 7ff70a9e532b 33760->33761 33762 7ff70a9e5336 CharNextW 33761->33762 33787 7ff70a9e5330 33761->33787 33762->33787 33763 7ff70a9e5442 33764 7ff70a9e547f CharNextW 33763->33764 33765 7ff70a9e548b 33763->33765 33766 7ff70a9e5455 33763->33766 33764->33765 33765->33766 33770 7ff70a9e551c 33765->33770 33845 7ff70a9f676c 33765->33845 33880 7ff70a9e4770 FormatMessageW 33766->33880 33769 7ff70a9e54e9 33886 7ff70a9e76e0 33769->33886 33862 7ff70a9e28b0 33770->33862 33773 7ff70aa0f44c 31 API calls 33773->33787 33775 7ff70aa0f4f0 33 API calls 33775->33787 33776 7ff70a9e55c2 33776->33769 33780 7ff70a9e55cd GetCurrentProcess OpenProcessToken 33776->33780 33777 7ff70a9e5577 33778 7ff70a9e5584 33777->33778 33779 7ff70a9e55a3 33777->33779 33785 7ff70a9e4770 68 API calls 33778->33785 33786 7ff70a9e4770 68 API calls 33779->33786 33781 7ff70a9e5648 InitiateSystemShutdownExW 33780->33781 33782 7ff70a9e55ea LookupPrivilegeValueW 33780->33782 33781->33769 33783 7ff70a9e5642 CloseHandle 33782->33783 33784 7ff70a9e5607 AdjustTokenPrivileges 33782->33784 33783->33781 33784->33783 33785->33769 33786->33769 33787->33763 33787->33773 33787->33775 33789->33732 33790 7ff70a9e86e4 GetModuleHandleW 33790->33740 33791->33742 33792->33728 33793->33731 33795 7ff70a9e918d __vcrt_initialize_winapi_thunks __vcrt_initialize 33794->33795 33807 7ff70a9e9d08 33795->33807 33798 7ff70a9e814b 33798->33750 33802 7ff70aa14568 33798->33802 33800 7ff70a9e91a4 33800->33798 33814 7ff70a9e9d6c DeleteCriticalSection 33800->33814 33804 7ff70aa25814 33802->33804 33803 7ff70a9e8158 33803->33750 33806 7ff70a9e91e0 8 API calls 3 library calls 33803->33806 33804->33803 33831 7ff70aa19fb0 33804->33831 33806->33750 33808 7ff70a9e9d10 33807->33808 33810 7ff70a9e9d41 33808->33810 33811 7ff70a9e9197 33808->33811 33815 7ff70a9ea598 33808->33815 33820 7ff70a9e9d6c DeleteCriticalSection 33810->33820 33811->33798 33813 7ff70a9e9c9c 8 API calls 3 library calls 33811->33813 33813->33800 33814->33798 33821 7ff70a9e9fe8 33815->33821 33818 7ff70a9ea5e3 InitializeCriticalSectionAndSpinCount 33819 7ff70a9ea5d8 33818->33819 33819->33808 33820->33811 33822 7ff70a9ea049 33821->33822 33829 7ff70a9ea044 try_get_module 33821->33829 33822->33818 33822->33819 33823 7ff70a9ea12c 33823->33822 33826 7ff70a9ea13a GetProcAddress 33823->33826 33824 7ff70a9ea078 LoadLibraryExW 33825 7ff70a9ea099 GetLastError 33824->33825 33824->33829 33825->33829 33827 7ff70a9ea14b 33826->33827 33827->33822 33828 7ff70a9ea111 FreeLibrary 33828->33829 33829->33822 33829->33823 33829->33824 33829->33828 33830 7ff70a9ea0d3 LoadLibraryExW 33829->33830 33830->33829 33842 7ff70aa21c48 EnterCriticalSection 33831->33842 33833 7ff70aa19fc0 33834 7ff70aa1ce60 32 API calls 33833->33834 33835 7ff70aa19fc9 33834->33835 33836 7ff70aa19db4 34 API calls 33835->33836 33841 7ff70aa19fd7 33835->33841 33838 7ff70aa19fd2 33836->33838 33837 7ff70aa21ca8 _onexit LeaveCriticalSection 33839 7ff70aa19fe3 33837->33839 33840 7ff70aa19ea4 GetStdHandle GetFileType 33838->33840 33839->33804 33840->33841 33841->33837 33843->33757 33844->33758 33846 7ff70a9f679d 33845->33846 33847 7ff70a9f6779 33845->33847 33850 7ff70a9f67d7 33846->33850 33851 7ff70a9f67f6 33846->33851 33847->33846 33848 7ff70a9f677e 33847->33848 33895 7ff70aa16b7c 14 API calls _invalid_parameter_noinfo_noreturn 33848->33895 33897 7ff70aa16b7c 14 API calls _invalid_parameter_noinfo_noreturn 33850->33897 33899 7ff70a9f65d8 37 API calls 2 library calls 33851->33899 33852 7ff70a9f6783 33896 7ff70aa169d0 31 API calls _invalid_parameter_noinfo_noreturn 33852->33896 33856 7ff70a9f67dc 33898 7ff70aa169d0 31 API calls _invalid_parameter_noinfo_noreturn 33856->33898 33857 7ff70a9f678e 33857->33765 33859 7ff70a9f67e7 TranslateName 33859->33765 33860 7ff70aa0f19c 38 API calls TranslateName 33861 7ff70a9f6803 33860->33861 33861->33859 33861->33860 33863 7ff70a9e28e4 33862->33863 33864 7ff70a9e29cc 33862->33864 33863->33864 33865 7ff70a9e28ed LoadStringW 33863->33865 33866 7ff70a9e76e0 _handle_errorf 8 API calls 33864->33866 33865->33864 33867 7ff70a9e290e LoadStringW 33865->33867 33868 7ff70a9e2a2e 33866->33868 33867->33864 33869 7ff70a9e292e LoadStringW 33867->33869 33868->33769 33868->33776 33868->33777 33869->33864 33870 7ff70a9e2951 33869->33870 33900 7ff70a9e41d0 33870->33900 33873 7ff70a9e29d0 33875 7ff70a9e29f2 33873->33875 33876 7ff70a9e29d7 33873->33876 33874 7ff70a9e29ba 33877 7ff70a9e4770 68 API calls 33874->33877 33878 7ff70a9e4770 68 API calls 33875->33878 33879 7ff70a9e4770 68 API calls 33876->33879 33877->33864 33878->33864 33879->33864 33881 7ff70a9e4811 33880->33881 33882 7ff70a9e47c7 33880->33882 33881->33769 33883 7ff70a9e480b LocalFree 33882->33883 33927 7ff70a9f6c8c 33882->33927 33883->33881 33887 7ff70a9e76ea 33886->33887 33888 7ff70a9e550b 33887->33888 33889 7ff70a9e7b50 IsProcessorFeaturePresent 33887->33889 33888->33790 33890 7ff70a9e7b67 33889->33890 33946 7ff70a9e7e54 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 33890->33946 33892 7ff70a9e7b7a 33947 7ff70a9e7b18 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 33892->33947 33895->33852 33896->33857 33897->33856 33898->33859 33899->33861 33901 7ff70a9e4254 33900->33901 33904 7ff70a9e425c 33900->33904 33902 7ff70a9e76e0 _handle_errorf 8 API calls 33901->33902 33903 7ff70a9e29ab 33902->33903 33903->33864 33903->33873 33903->33874 33904->33901 33905 7ff70a9e42ac SetupDiClassGuidsFromNameExW 33904->33905 33914 7ff70a9e42dd 33904->33914 33906 7ff70a9e42d2 GetLastError 33905->33906 33905->33914 33912 7ff70a9e42e4 33906->33912 33906->33914 33907 7ff70a9e4425 33908 7ff70a9e4464 SetupDiGetClassDevsExW 33907->33908 33909 7ff70a9e443e SetupDiCreateDeviceInfoListExW 33907->33909 33917 7ff70a9e44a9 33908->33917 33909->33917 33910 7ff70a9e43b8 CharNextW 33910->33914 33911 7ff70a9e43d6 CharNextW 33911->33914 33912->33901 33916 7ff70a9e42fd SetupDiDestroyDeviceInfoList 33912->33916 33913 7ff70a9e4516 SetupDiGetDeviceInfoListDetailW 33913->33912 33915 7ff70a9e4532 SetupDiEnumDeviceInfo 33913->33915 33914->33907 33914->33910 33914->33911 33914->33912 33915->33912 33925 7ff70a9e456a 33915->33925 33916->33901 33917->33912 33917->33913 33918 7ff70a9e44e8 SetupDiOpenDeviceInfoW 33917->33918 33919 7ff70a9e4509 33917->33919 33918->33917 33919->33913 33920 7ff70a9e46ec SetupDiEnumDeviceInfo 33920->33912 33920->33925 33921 7ff70a9e45a9 CM_Get_Device_ID_ExW 33921->33925 33922 7ff70a9e4820 SetupDiGetDeviceRegistryPropertyW GetLastError SetupDiGetDeviceRegistryPropertyW 33922->33925 33924 7ff70a9e50e0 41 API calls 33924->33925 33925->33912 33925->33920 33925->33921 33925->33922 33925->33924 33926 7ff70a9e4f10 41 API calls TranslateName 33925->33926 33926->33925 33928 7ff70a9f6ca3 33927->33928 33929 7ff70a9f6cb8 33927->33929 33943 7ff70aa16b7c 14 API calls _invalid_parameter_noinfo_noreturn 33928->33943 33929->33928 33930 7ff70a9f6cbd 33929->33930 33936 7ff70a9f6b3c 33930->33936 33933 7ff70a9f6ca8 33944 7ff70aa169d0 31 API calls _invalid_parameter_noinfo_noreturn 33933->33944 33935 7ff70a9e4806 33935->33883 33945 7ff70a9f6b24 EnterCriticalSection 33936->33945 33938 7ff70a9f6b59 33939 7ff70a9f6bfc 64 API calls 33938->33939 33940 7ff70a9f6b62 33939->33940 33941 7ff70a9f6b30 LeaveCriticalSection 33940->33941 33942 7ff70a9f6b6c 33941->33942 33942->33935 33943->33933 33944->33935 33946->33892

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 0 7ff70a9e41d0-7ff70a9e4252 1 7ff70a9e4254-7ff70a9e4257 0->1 2 7ff70a9e425c-7ff70a9e4280 call 7ff70a9e7638 0->2 3 7ff70a9e430a-7ff70a9e4333 call 7ff70a9e76e0 1->3 8 7ff70a9e4306 2->8 9 7ff70a9e4286-7ff70a9e4288 2->9 8->3 10 7ff70a9e436f 9->10 11 7ff70a9e428e-7ff70a9e4298 9->11 14 7ff70a9e4372 10->14 12 7ff70a9e4346 11->12 13 7ff70a9e429e-7ff70a9e42a6 11->13 15 7ff70a9e4349-7ff70a9e434c 12->15 13->12 16 7ff70a9e42ac-7ff70a9e42d0 SetupDiClassGuidsFromNameExW 13->16 17 7ff70a9e4378-7ff70a9e4383 14->17 15->14 18 7ff70a9e434e-7ff70a9e435c 15->18 19 7ff70a9e42d2-7ff70a9e42db GetLastError 16->19 20 7ff70a9e42dd-7ff70a9e42e2 16->20 21 7ff70a9e4434-7ff70a9e4437 17->21 22 7ff70a9e4389-7ff70a9e439f 17->22 18->17 23 7ff70a9e435e-7ff70a9e4363 18->23 19->20 24 7ff70a9e42ea 19->24 25 7ff70a9e4334-7ff70a9e4344 20->25 26 7ff70a9e42e4 20->26 27 7ff70a9e4464-7ff70a9e44a3 SetupDiGetClassDevsExW 21->27 28 7ff70a9e4439-7ff70a9e443c 21->28 29 7ff70a9e43a0-7ff70a9e43b6 22->29 23->17 30 7ff70a9e4365-7ff70a9e436d 23->30 32 7ff70a9e42ef-7ff70a9e42fb call 7ff70a9e7640 24->32 25->15 31 7ff70a9e42e6 26->31 34 7ff70a9e44a9-7ff70a9e44b5 27->34 28->27 33 7ff70a9e443e-7ff70a9e4462 SetupDiCreateDeviceInfoListExW 28->33 35 7ff70a9e43cd-7ff70a9e43d4 29->35 36 7ff70a9e43b8-7ff70a9e43c8 CharNextW 29->36 30->14 31->24 32->8 50 7ff70a9e42fd-7ff70a9e4300 SetupDiDestroyDeviceInfoList 32->50 33->34 34->24 38 7ff70a9e44bb-7ff70a9e44c8 34->38 39 7ff70a9e43e3-7ff70a9e43ed call 7ff70a9e8e50 35->39 40 7ff70a9e43d6-7ff70a9e43e1 CharNextW 35->40 36->35 44 7ff70a9e4516-7ff70a9e452c SetupDiGetDeviceInfoListDetailW 38->44 45 7ff70a9e44ca-7ff70a9e44dd 38->45 41 7ff70a9e43f2-7ff70a9e4408 39->41 40->41 47 7ff70a9e440f 41->47 48 7ff70a9e440a-7ff70a9e440d 41->48 44->32 49 7ff70a9e4532-7ff70a9e4564 SetupDiEnumDeviceInfo 44->49 51 7ff70a9e44e2-7ff70a9e44e6 45->51 54 7ff70a9e4415-7ff70a9e441f 47->54 48->47 48->54 55 7ff70a9e4720-7ff70a9e4725 49->55 56 7ff70a9e456a 49->56 50->8 52 7ff70a9e44ff-7ff70a9e4507 51->52 53 7ff70a9e44e8-7ff70a9e44f9 SetupDiOpenDeviceInfoW 51->53 52->51 57 7ff70a9e4509-7ff70a9e4511 52->57 53->52 54->29 59 7ff70a9e4425-7ff70a9e442f 54->59 55->32 58 7ff70a9e4570-7ff70a9e4573 56->58 57->44 60 7ff70a9e46c2-7ff70a9e46e1 58->60 61 7ff70a9e4579-7ff70a9e4584 58->61 59->21 60->31 68 7ff70a9e46e7 60->68 62 7ff70a9e46ec-7ff70a9e4715 SetupDiEnumDeviceInfo 61->62 63 7ff70a9e458a-7ff70a9e459f 61->63 62->58 64 7ff70a9e471b 62->64 65 7ff70a9e45a0-7ff70a9e45a3 63->65 64->55 65->60 67 7ff70a9e45a9-7ff70a9e45d0 CM_Get_Device_ID_ExW 65->67 69 7ff70a9e45d2-7ff70a9e45d4 67->69 70 7ff70a9e45db-7ff70a9e45eb 67->70 68->62 69->70 71 7ff70a9e460f-7ff70a9e4637 call 7ff70a9e4820 * 2 70->71 72 7ff70a9e45ed-7ff70a9e45fe call 7ff70a9e4f10 70->72 80 7ff70a9e463c-7ff70a9e464c call 7ff70a9e50e0 71->80 77 7ff70a9e4604-7ff70a9e460a 72->77 78 7ff70a9e46a5-7ff70a9e46b7 72->78 77->78 78->65 81 7ff70a9e46bd-7ff70a9e46c0 78->81 84 7ff70a9e464e-7ff70a9e465b call 7ff70a9e50e0 80->84 85 7ff70a9e465d 80->85 81->60 81->68 84->85 87 7ff70a9e4663-7ff70a9e4666 84->87 85->87 89 7ff70a9e467f-7ff70a9e4682 87->89 90 7ff70a9e4668-7ff70a9e466f 87->90 91 7ff70a9e4684-7ff70a9e468b 89->91 92 7ff70a9e469b-7ff70a9e46a0 89->92 93 7ff70a9e4676-7ff70a9e467a call 7ff70a9e7640 90->93 94 7ff70a9e4671 call 7ff70a9e7640 90->94 96 7ff70a9e4692-7ff70a9e4696 call 7ff70a9e7640 91->96 97 7ff70a9e468d call 7ff70a9e7640 91->97 92->78 93->89 94->93 96->92 97->96
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$Device$Info$CharListNext$ClassEnumErrorLastPropertyRegistry$CreateDestroyDetailDevice_DevsFromGet_GuidsNameOpen
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1969824741-0
                                                                                                                                                                                                                              • Opcode ID: e3fc275db21e76c52ccaa19e33234cd324650c93cf9cefaf585751d13ce00979
                                                                                                                                                                                                                              • Instruction ID: 1a3f711d9bca4edab79e6bfa7d1a67e80329c2d97249104459b84cc09a9c6564
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e3fc275db21e76c52ccaa19e33234cd324650c93cf9cefaf585751d13ce00979
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 44E19F33B2CA8286FB20EF15E9402AAA3A0FF94B9CF844175DA4D87B95DF3DD5418710

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 101 7ff70a9e52e0-7ff70a9e532e call 7ff70a9e8ecc 104 7ff70a9e5336-7ff70a9e533f CharNextW 101->104 105 7ff70a9e5330-7ff70a9e5334 101->105 106 7ff70a9e5342-7ff70a9e5362 104->106 105->106 107 7ff70a9e544c-7ff70a9e5453 106->107 108 7ff70a9e5368-7ff70a9e536f 106->108 109 7ff70a9e5455-7ff70a9e5462 call 7ff70a9f6a60 107->109 110 7ff70a9e5467-7ff70a9e547d 107->110 111 7ff70a9e5371-7ff70a9e5380 108->111 124 7ff70a9e54dc-7ff70a9e54e9 call 7ff70a9e4770 109->124 113 7ff70a9e547f-7ff70a9e5488 CharNextW 110->113 114 7ff70a9e548b-7ff70a9e5499 110->114 115 7ff70a9e5386-7ff70a9e5391 111->115 116 7ff70a9e5442-7ff70a9e5447 111->116 113->114 120 7ff70a9e549b-7ff70a9e549e 114->120 121 7ff70a9e54cd-7ff70a9e54d7 call 7ff70a9f6a60 114->121 118 7ff70a9e541e-7ff70a9e5423 115->118 119 7ff70a9e5397-7ff70a9e539e 115->119 116->107 118->116 122 7ff70a9e5425-7ff70a9e542d 118->122 125 7ff70a9e53a0-7ff70a9e53a7 119->125 126 7ff70a9e540d-7ff70a9e5412 119->126 127 7ff70a9e54a0-7ff70a9e54ad call 7ff70a9f676c 120->127 121->124 122->116 128 7ff70a9e542f 122->128 142 7ff70a9e54ee-7ff70a9e551b call 7ff70a9e76e0 124->142 131 7ff70a9e5400-7ff70a9e5405 125->131 132 7ff70a9e53a9-7ff70a9e53b1 125->132 126->116 134 7ff70a9e5414-7ff70a9e541c 126->134 140 7ff70a9e54b4-7ff70a9e54cb 127->140 141 7ff70a9e54af-7ff70a9e54b2 127->141 135 7ff70a9e5434-7ff70a9e543c 128->135 131->116 137 7ff70a9e5407-7ff70a9e540b 131->137 132->116 138 7ff70a9e53b7-7ff70a9e53bc 132->138 134->135 135->111 135->116 137->135 138->116 143 7ff70a9e53c2-7ff70a9e53fe call 7ff70a9f6a60 call 7ff70aa0f44c call 7ff70aa0f4f0 call 7ff70a9f6a60 call 7ff70aa0f44c call 7ff70aa0f4f0 138->143 140->121 140->127 141->140 145 7ff70a9e551c-7ff70a9e5560 call 7ff70a9e28b0 141->145 143->135 150 7ff70a9e5566-7ff70a9e556c 145->150 152 7ff70a9e5572-7ff70a9e5575 150->152 153 7ff70a9e5668-7ff70a9e566a 150->153 155 7ff70a9e55c2-7ff70a9e55c7 152->155 156 7ff70a9e5577-7ff70a9e5582 152->156 153->142 155->153 160 7ff70a9e55cd-7ff70a9e55e8 GetCurrentProcess OpenProcessToken 155->160 157 7ff70a9e5584-7ff70a9e559e call 7ff70a9f6a60 call 7ff70a9e4770 156->157 158 7ff70a9e55a3-7ff70a9e55bd call 7ff70a9f6a60 call 7ff70a9e4770 156->158 157->142 158->142 164 7ff70a9e5648-7ff70a9e5662 InitiateSystemShutdownExW 160->164 165 7ff70a9e55ea-7ff70a9e5605 LookupPrivilegeValueW 160->165 164->153 169 7ff70a9e5642 CloseHandle 165->169 170 7ff70a9e5607-7ff70a9e563d AdjustTokenPrivileges 165->170 169->164 170->169
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CharNextProcessToken$AdjustCloseCurrentHandleInitiateLookupOpenPrivilegePrivilegesShutdownSystemValue
                                                                                                                                                                                                                              • String ID: SeShutdownPrivilege
                                                                                                                                                                                                                              • API String ID: 155161866-3733053543
                                                                                                                                                                                                                              • Opcode ID: 690a37cff1ebd05a7ace56d9b70eff1ddf708b3d2d7106c5651630866a9856b2
                                                                                                                                                                                                                              • Instruction ID: c1317b78ae604da6bf74996fc8effe1b3af72fce66036b3d771b53dbde23abc7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 690a37cff1ebd05a7ace56d9b70eff1ddf708b3d2d7106c5651630866a9856b2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B691D423B1C68242FB50EB19E804779A790FF94B8DF954075EA4E83796EF3CE4468320

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetupDiGetDeviceRegistryPropertyW.SETUPAPI(?,?,?,?,?,?,00007FF70A9E4624), ref: 00007FF70A9E487F
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00007FF70A9E4624), ref: 00007FF70A9E4894
                                                                                                                                                                                                                              • SetupDiGetDeviceRegistryPropertyW.SETUPAPI(?,?,?,?,?,?,?,?,?,00007FF70A9E4624), ref: 00007FF70A9E4906
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DevicePropertyRegistrySetup$ErrorLast
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2536536880-0
                                                                                                                                                                                                                              • Opcode ID: b08a90b2f0a11205ef17a48f86861e3f30d8e072d4f5542cce9f06ad5cb14e1f
                                                                                                                                                                                                                              • Instruction ID: 51896516a60243bcf7cbca3060553d67b195ce275a6294692458e43cec6bd590
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b08a90b2f0a11205ef17a48f86861e3f30d8e072d4f5542cce9f06ad5cb14e1f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FC31D423B1C78182FA20DB11F84026EA2A0FFD9F94F844275EA9D83B96DF3CD4018B50

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CurrentTime__scrt_fastfail$CounterFilePerformanceProcessQuerySystemThread__scrt_acquire_startup_lock__scrt_is_managed_app__scrt_release_startup_lock__security_init_cookie__vcrt_initialize
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1566696921-0
                                                                                                                                                                                                                              • Opcode ID: 5dc8b7a00be0a8ea12488835e6aaa7bc2ada64c6aaa8309da5ac7729ad6df155
                                                                                                                                                                                                                              • Instruction ID: 08aa0f883f17796cfaf77d6a61e93d254a2b663c290464ef5a7d3ea6d79aaac1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5dc8b7a00be0a8ea12488835e6aaa7bc2ada64c6aaa8309da5ac7729ad6df155
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 77414A63F1C14342FA14FBA4DC116B99291AF65788FC085B8E64E8B3D3DF2CA8428271

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 246 7ff70aa2716c-7ff70aa2718f 247 7ff70aa2742c 246->247 248 7ff70aa27195-7ff70aa27198 246->248 249 7ff70aa2742e-7ff70aa27445 247->249 250 7ff70aa271ba-7ff70aa271e0 248->250 251 7ff70aa2719a-7ff70aa271b5 call 7ff70aa16b5c call 7ff70aa16b7c call 7ff70aa169d0 248->251 253 7ff70aa271eb-7ff70aa271f1 250->253 254 7ff70aa271e2-7ff70aa271e9 250->254 251->249 256 7ff70aa27201-7ff70aa27211 call 7ff70aa27a4c 253->256 257 7ff70aa271f3-7ff70aa271fc call 7ff70aa2e524 253->257 254->251 254->253 264 7ff70aa27217-7ff70aa27227 256->264 265 7ff70aa2731a-7ff70aa2732a 256->265 257->256 264->265 269 7ff70aa2722d-7ff70aa27240 call 7ff70aa175e8 264->269 267 7ff70aa2732c-7ff70aa27333 265->267 268 7ff70aa2737b-7ff70aa273a0 WriteFile 265->268 273 7ff70aa27367-7ff70aa27374 call 7ff70aa26ce0 267->273 274 7ff70aa27335-7ff70aa27338 267->274 271 7ff70aa273ab 268->271 272 7ff70aa273a2-7ff70aa273a8 GetLastError 268->272 280 7ff70aa27258-7ff70aa27274 GetConsoleMode 269->280 281 7ff70aa27242-7ff70aa27252 269->281 277 7ff70aa273ae 271->277 272->271 282 7ff70aa27379 273->282 278 7ff70aa2733a-7ff70aa2733d 274->278 279 7ff70aa27353-7ff70aa27365 call 7ff70aa26f00 274->279 283 7ff70aa273b3 277->283 284 7ff70aa273b8-7ff70aa273c2 278->284 285 7ff70aa2733f-7ff70aa27351 call 7ff70aa26de4 278->285 289 7ff70aa2730e-7ff70aa27315 279->289 280->265 288 7ff70aa2727a-7ff70aa2727d 280->288 281->265 281->280 282->289 283->284 290 7ff70aa273c4-7ff70aa273c9 284->290 291 7ff70aa27425-7ff70aa2742a 284->291 285->289 293 7ff70aa272fc-7ff70aa27309 call 7ff70aa266e8 288->293 294 7ff70aa2727f-7ff70aa27286 288->294 289->283 295 7ff70aa273cb-7ff70aa273ce 290->295 296 7ff70aa273f5-7ff70aa27406 290->296 291->249 293->289 294->284 299 7ff70aa2728c-7ff70aa2729c 294->299 302 7ff70aa273eb-7ff70aa273f0 call 7ff70aa16b0c 295->302 303 7ff70aa273d0-7ff70aa273e0 call 7ff70aa16b7c call 7ff70aa16b5c 295->303 300 7ff70aa27408-7ff70aa2740b 296->300 301 7ff70aa2740d-7ff70aa2741d call 7ff70aa16b7c call 7ff70aa16b5c 296->301 305 7ff70aa2729e 299->305 306 7ff70aa272f5-7ff70aa272f7 299->306 300->247 300->301 301->291 302->296 303->302 310 7ff70aa272a1-7ff70aa272b8 call 7ff70aa2e604 305->310 306->277 319 7ff70aa272ba-7ff70aa272c4 310->319 320 7ff70aa272ec-7ff70aa272f2 GetLastError 310->320 321 7ff70aa272e1-7ff70aa272e8 319->321 322 7ff70aa272c6-7ff70aa272d8 call 7ff70aa2e604 319->322 320->306 321->306 323 7ff70aa272ea 321->323 322->320 326 7ff70aa272da-7ff70aa272df 322->326 323->310 326->321
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF70AA271AD
                                                                                                                                                                                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B,?,?,?,00007FF70AA277D2), ref: 00007FF70AA2726C
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B,?,?,?,00007FF70AA277D2), ref: 00007FF70AA272EC
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2210144848-0
                                                                                                                                                                                                                              • Opcode ID: 5b577d0101186b3dee45c0514d8567f2aff468ee3d1ca196f04eb6bda83befe3
                                                                                                                                                                                                                              • Instruction ID: fb9cbe6ebee12f9dac33cb38a492dd5686cb20073a0b84bf4915c5aae8ab8ebc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5b577d0101186b3dee45c0514d8567f2aff468ee3d1ca196f04eb6bda83befe3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 37818EA3A1861285F761AB69DC80ABDA7A1BF44784FC00175DE0E63BD5DF38A566C330

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: LoadString$FormatFreeLocalMessage
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 725706356-0
                                                                                                                                                                                                                              • Opcode ID: d1c2bf7ba6e30959b680a2a26bbfb6c667ed2b04af53c45da1eed3ab1d55b066
                                                                                                                                                                                                                              • Instruction ID: ed55803003f206a915d500c26c4a586aa64b316aead68be90cf763a08a77e689
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d1c2bf7ba6e30959b680a2a26bbfb6c667ed2b04af53c45da1eed3ab1d55b066
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 15417F73B1C68286FB70EB11E8407AAB2A4FF94748F904075DA4D93B96DF2DD855CB20

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1703294689-0
                                                                                                                                                                                                                              • Opcode ID: 08b53547627d342cef18f15c3e291c34f31992f781596ea9132903bd88c460e4
                                                                                                                                                                                                                              • Instruction ID: b59e12b8ee2b84cefa3237deb460c3f7de8f1504f0073a8d3bb11dd03795b349
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 08b53547627d342cef18f15c3e291c34f31992f781596ea9132903bd88c460e4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0BE048A7F0430143FA547770EC95E7992526F48742F9446BCDA1E423D2CF3DE44A8321

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 386 7ff70aa18634-7ff70aa18657 call 7ff70aa181a8 388 7ff70aa1865c-7ff70aa1865f 386->388 389 7ff70aa18677-7ff70aa18681 388->389 390 7ff70aa18661-7ff70aa18670 388->390 390->389
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function
                                                                                                                                                                                                                              • String ID: AppPolicyGetProcessTerminationMethod
                                                                                                                                                                                                                              • API String ID: 2742660187-2031265017
                                                                                                                                                                                                                              • Opcode ID: 09745aa082c0f9a3d57ff4a42a6b74f56dafb84feddb837b008a725231bf0058
                                                                                                                                                                                                                              • Instruction ID: 944c2e6789b0c6bacf5557d998528d248e3109eaacdc8fcaa564118b468dd824
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 09745aa082c0f9a3d57ff4a42a6b74f56dafb84feddb837b008a725231bf0058
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 84E04FD3E04606A1FA05E791EC409B092119F4C3B0EC803B2ED3C0A3E09F3C9996C760

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 391 7ff70aa26ce0-7ff70aa26d46 call 7ff70a9e7750 394 7ff70aa26d48 391->394 395 7ff70aa26db7-7ff70aa26de1 call 7ff70a9e76e0 391->395 396 7ff70aa26d4d-7ff70aa26d50 394->396 398 7ff70aa26d52-7ff70aa26d59 396->398 399 7ff70aa26d76-7ff70aa26d9b WriteFile 396->399 401 7ff70aa26d5b-7ff70aa26d61 398->401 402 7ff70aa26d64-7ff70aa26d74 398->402 403 7ff70aa26d9d-7ff70aa26da6 399->403 404 7ff70aa26daf-7ff70aa26db5 GetLastError 399->404 401->402 402->396 402->399 403->395 405 7ff70aa26da8-7ff70aa26dab 403->405 404->395 405->394 406 7ff70aa26dad 405->406 406->395
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorFileLastWrite
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 442123175-0
                                                                                                                                                                                                                              • Opcode ID: db3742f2bb6f116d389edc3337e853886a6bb6baf124e39b63c995694271e509
                                                                                                                                                                                                                              • Instruction ID: 54b66c02cd90fbb909f901ca0e0805b35d137f6208ced77b7931389c5b4bc2b9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: db3742f2bb6f116d389edc3337e853886a6bb6baf124e39b63c995694271e509
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8F31C2B3A19A8586EB10AF19E8406E9B760FF58780F844072EA4D83795DF3CD562C710

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FileHandleType
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3000768030-0
                                                                                                                                                                                                                              • Opcode ID: 2a7858ea0a20d78d229f8241a9e12833e585a3072b3a1a0811a3e501217574ad
                                                                                                                                                                                                                              • Instruction ID: c3fac8ad94b50b667ac10796ffa52a88003e40704dc21a465f092ada7567c847
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2a7858ea0a20d78d229f8241a9e12833e585a3072b3a1a0811a3e501217574ad
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7031A363A18B46A1F7649B15CDA057AA750FF45BA0FA40379EB6E073E0CF38E452C391

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 427 7ff70a9e4770-7ff70a9e47c5 FormatMessageW 428 7ff70a9e4811-7ff70a9e4817 427->428 429 7ff70a9e47c7-7ff70a9e47c9 427->429 430 7ff70a9e480b LocalFree 429->430 431 7ff70a9e47cb-7ff70a9e47ce 429->431 430->428 432 7ff70a9e47f6-7ff70a9e4801 call 7ff70a9f6c8c 431->432 433 7ff70a9e47d0 431->433 438 7ff70a9e4806 432->438 434 7ff70a9e47d3-7ff70a9e47d6 433->434 436 7ff70a9e47de-7ff70a9e47f4 434->436 437 7ff70a9e47d8-7ff70a9e47db 434->437 436->432 436->434 437->436 438->430
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00007FF70A9E10DD), ref: 00007FF70A9E47B7
                                                                                                                                                                                                                              • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00007FF70A9E10DD), ref: 00007FF70A9E480B
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FormatFreeLocalMessage
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1427518018-0
                                                                                                                                                                                                                              • Opcode ID: faddade6f339ff3cc93d48928193cad67dc264e1d8a9395bb651df8655175f89
                                                                                                                                                                                                                              • Instruction ID: 6a50a1e3d2507cbf467f72a45cbdb5ac61e751163942ebcfd8e6ffebbc7bc4ac
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: faddade6f339ff3cc93d48928193cad67dc264e1d8a9395bb651df8655175f89
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E1117673B29B4481EB51EF11E84412AB3A5FF99B84F968036DA5D87750EF3EC891C360

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: __vcrt_initialize__vcrt_initialize_locks__vcrt_initialize_winapi_thunks__vcrt_uninitialize
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1882725809-0
                                                                                                                                                                                                                              • Opcode ID: 8f237d6502b14b0254a4c674743dae8b4da91eb28c515f3ea25adcbd20d46fa1
                                                                                                                                                                                                                              • Instruction ID: c23fb62aeaad73e35998da468b43ba47b4f06fc0b5a7ed7aa5df38ef71a16d00
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8f237d6502b14b0254a4c674743dae8b4da91eb28c515f3ea25adcbd20d46fa1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C1E01A82F2D24255FE64B7B5EC826B9D6800F7A389FC444F9E89DC22C38F0D644A6670

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 77c9f455ae7dbfbf764ac100925fa24616ef860103a1a996772a9699631fd484
                                                                                                                                                                                                                              • Instruction ID: dfb364f1ee4c71508f7a996d7e5e6dce330482ced0c291286ff4fdec5e18f042
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 77c9f455ae7dbfbf764ac100925fa24616ef860103a1a996772a9699631fd484
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7721DEA3A0824266F7017F29DC81B79A650AF44BA0F9402B8E91C573E2DF7CE4538720

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3947729631-0
                                                                                                                                                                                                                              • Opcode ID: 9b5487346ef9f63116b54207664187879175fdd5b6014f44a2d1d5806b6a0d0e
                                                                                                                                                                                                                              • Instruction ID: 0f82d28252e3f611442773aefe7521ebad581f8c27ad7905b634d0b009c7e043
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9b5487346ef9f63116b54207664187879175fdd5b6014f44a2d1d5806b6a0d0e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6B219D72E087019AFB51AF64C9806EC76A0EB4431CF84463EDB1D12BC6DF38C446CB94

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3215553584-0
                                                                                                                                                                                                                              • Opcode ID: 29ed8d9b04594f7865511f83e8ab8f204f57b5d6501f11963fc871f8f78e5789
                                                                                                                                                                                                                              • Instruction ID: 735b184ae0d31176495f621a734ec7a671f5acd48d2bdc45f7d3f7d439bbfded
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 29ed8d9b04594f7865511f83e8ab8f204f57b5d6501f11963fc871f8f78e5789
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 85118BB394C64292F310AF14E880D3AE3A4EF80750F9500B5E65D97BD6DF3CE8228760
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3215553584-0
                                                                                                                                                                                                                              • Opcode ID: b1701a4419845fdea9b25c0b889f21a2cfcb31a46c6b6b47c9f4c5ea8d08c04c
                                                                                                                                                                                                                              • Instruction ID: c9ba475867d32c0acbf9e25f00b8236286ae53c97f3cfa5dc0fbf01caedf4e2d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b1701a4419845fdea9b25c0b889f21a2cfcb31a46c6b6b47c9f4c5ea8d08c04c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CBF019B3A14B4298FB01AFA0DC410EC76B4FF14398F904A76EB9C42698EF38D155C2A0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • HeapAlloc.KERNEL32(?,?,00000000,00007FF70AA177C1,?,?,00000000,00007FF70AA16B85,?,?,?,?,00007FF70A9F6CA8), ref: 00007FF70AA179CD
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AllocHeap
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 4292702814-0
                                                                                                                                                                                                                              • Opcode ID: 3983c4821dd1e57c8f0338e38868bd111ba754eec4fe96f30a7891404f0fea4d
                                                                                                                                                                                                                              • Instruction ID: 177e4e08aea3cc6b365f7782519c032af8fbc0f33123f7507a71ae1d7ee15446
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3983c4821dd1e57c8f0338e38868bd111ba754eec4fe96f30a7891404f0fea4d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3FF0AF82B0920764FE95B661DC50AB5D6849F88780FCC64B1C80D863C1FF2DE89B4630
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::operator+$Name::doPchar$Name::operator+=
                                                                                                                                                                                                                              • String ID: [thunk]:$`adjustor{$`local static destructor helper'$`template static data member constructor helper'$`template static data member destructor helper'$`vtordispex{$`vtordisp{$extern "C" $private: $protected: $public: $static $virtual ${flat}${for $}'
                                                                                                                                                                                                                              • API String ID: 2654205828-3103905019
                                                                                                                                                                                                                              • Opcode ID: 344dc4b9ba1a62ce6824673a4e2a2672d5d17c1497d6831b0eb881a8fb7f10fb
                                                                                                                                                                                                                              • Instruction ID: 8038bc5a7301c0e8eba7c80bba3b0f1ac2021e2f0ce9df50331c7df0af2204eb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 344dc4b9ba1a62ce6824673a4e2a2672d5d17c1497d6831b0eb881a8fb7f10fb
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 13825273B2C68296FB40EB24D8802A9B7A0FF94388F905075EA4DC7A9ADF7CD545C750
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$DeviceDriverInfoInstallParams$BuildCloseEnumListOpen
                                                                                                                                                                                                                              • String ID: DriverDesc$InfPath$InfSection$ProviderName
                                                                                                                                                                                                                              • API String ID: 1704563315-109328823
                                                                                                                                                                                                                              • Opcode ID: 470132caa0e5c2b1524e902dcaad2fd13110990853be0799e79165d4b753c384
                                                                                                                                                                                                                              • Instruction ID: 23823f0aa8e5bc48ae567e220451c2b702db3ae758c3008c26a7f719b3c02eb0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 470132caa0e5c2b1524e902dcaad2fd13110990853be0799e79165d4b753c384
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 07B1B233B1C78286FB609F61E8447AAB7A1FF94B89F800075EA4D82A94EF3CD505D711
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetupOpenInfFileW.SETUPAPI(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6CD1
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6CE0
                                                                                                                                                                                                                              • SetupFindFirstLineW.SETUPAPI(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6D0C
                                                                                                                                                                                                                              • SetupGetStringFieldW.SETUPAPI(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6D32
                                                                                                                                                                                                                              • SetupFindFirstLineW.SETUPAPI(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6D89
                                                                                                                                                                                                                              • SetupGetStringFieldW.SETUPAPI(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6DB3
                                                                                                                                                                                                                              • CLSIDFromString.OLE32(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6DC9
                                                                                                                                                                                                                              • SetupDiGetClassDescriptionExW.SETUPAPI(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6DF2
                                                                                                                                                                                                                              • LoadLibraryW.KERNEL32(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6E3A
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,?,00000000,00000000,?,00007FF70A9E3786), ref: 00007FF70A9E6E5E
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00007FF70A9E6EA1
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00007FF70A9E6EAE
                                                                                                                                                                                                                              • SetupFindFirstLineW.SETUPAPI ref: 00007FF70A9E6F08
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$ErrorFindFirstLastLineString$Field$AddressClassDescriptionFileFromLibraryLoadOpenProc
                                                                                                                                                                                                                              • String ID: ClassGUID$DriverVer$Provider$SetupVerifyInfFile$Version$setupapi.dll
                                                                                                                                                                                                                              • API String ID: 2815445529-1638047923
                                                                                                                                                                                                                              • Opcode ID: ccf9f4b43b9fad1fa27bc109124458a99df6b9793aee5966b8e4b19aae1b4082
                                                                                                                                                                                                                              • Instruction ID: bb1b56e841cbc88cde02e80991b708fd821d7e4d56607c3a31c661c4abd6f988
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ccf9f4b43b9fad1fa27bc109124458a99df6b9793aee5966b8e4b19aae1b4082
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B4916063B2CA8242F710FB61EC106FAA251EF98B49FC04476E90E876D6DF3DE5558360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                                                                                                                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                              • API String ID: 808467561-2761157908
                                                                                                                                                                                                                              • Opcode ID: 64e267bf78fb629f889f1a9ca02426a2b841f9d57b2607d640a5240c26589488
                                                                                                                                                                                                                              • Instruction ID: a9566c981cdfd63ea31a2c89c38c7512b2504e4ce6f5c6546d8c2727d7696d89
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 64e267bf78fb629f889f1a9ca02426a2b841f9d57b2607d640a5240c26589488
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A4B2F9B3A181828BF7259E69C940BFDB7A1FF44388F905175DA0A67BC4DF38A552C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$ClassFromGuidsName$DestroyDeviceErrorInfoLastList
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1066883911-3916222277
                                                                                                                                                                                                                              • Opcode ID: 95c7f67f37713cc790260966e8adad9794b378fe7e5710a0f5457cdb6cacd70d
                                                                                                                                                                                                                              • Instruction ID: b49f9d6b429ccb8afdd380f2c6e331d2b61fb5c5ead52509134e15408905580b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 95c7f67f37713cc790260966e8adad9794b378fe7e5710a0f5457cdb6cacd70d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E9B1A263B1864282FB20EB65EC406A9A3A0FF94BA8F944375DE5D837D5DF3CD5058710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: memcpy_s$_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: s
                                                                                                                                                                                                                              • API String ID: 2880407647-453955339
                                                                                                                                                                                                                              • Opcode ID: 5bbfe94752329b1da8265bf6d51677381658838f21c0a74a2938933cdb4c1ac6
                                                                                                                                                                                                                              • Instruction ID: 048d9269cf648584af0b863000b0d934e02ab15e65051397a5f2c3fe592aaf1b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5bbfe94752329b1da8265bf6d51677381658838f21c0a74a2938933cdb4c1ac6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EBA2D6B3A081C18BF7359E29D940AE9B795FF58788F900175EB0A67BD4DB3CE5128B10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: memcpy_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1502251526-0
                                                                                                                                                                                                                              • Opcode ID: ac952aa7c694147f99d3e4b40430f2bf787c9728cbc095bc21ac10cb0df3e7be
                                                                                                                                                                                                                              • Instruction ID: f10af527b1d58923bdbc144600b9d1a8f8e857b9238ba6a28aa695bad060b75a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ac952aa7c694147f99d3e4b40430f2bf787c9728cbc095bc21ac10cb0df3e7be
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DAE1C5B36082828BFB24DF19D844AE9B7A0FF49788F809175DB0957B84DB39D916CB50
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF70AA1E0E0
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA16A20: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF70AA169CD), ref: 00007FF70AA16A29
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA16A20: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF70AA169CD), ref: 00007FF70AA16A4E
                                                                                                                                                                                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF70AA1E305
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo$CurrentFeaturePresentProcessProcessor
                                                                                                                                                                                                                              • String ID: *?
                                                                                                                                                                                                                              • API String ID: 1697365638-2564092906
                                                                                                                                                                                                                              • Opcode ID: 63c62522b583ab65492df3df2897c9d34e58fcc378565526384e87568434e7d9
                                                                                                                                                                                                                              • Instruction ID: b9067d135c927d1461a1ecba112ea80e4942e02df57b6184479b6dcb6d115055
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 63c62522b583ab65492df3df2897c9d34e58fcc378565526384e87568434e7d9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3EF1F1A3B1869195FA20EB66DC009B9A7A1FF48BD4F844576EE5D07BC4EF3CD4468320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ProcessToken$AdjustCloseCurrentHandleInitiateLookupOpenPrivilegePrivilegesShutdownSystemValue
                                                                                                                                                                                                                              • String ID: SeShutdownPrivilege
                                                                                                                                                                                                                              • API String ID: 2036077386-3733053543
                                                                                                                                                                                                                              • Opcode ID: f561dac5e6c18281b4010f054e9054ffc8b813bd40337e654f72e59e3645770f
                                                                                                                                                                                                                              • Instruction ID: 271adfe5816071153ec3a021cbf0da2a55b18bfc21b7ea2323db353ed65f302d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f561dac5e6c18281b4010f054e9054ffc8b813bd40337e654f72e59e3645770f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C111CB7A18A4283FB60EF61F855A6AB7A0FF89745F805075EA8E42A54CF7DD0058B10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: memcpy_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1502251526-0
                                                                                                                                                                                                                              • Opcode ID: 367b353356dc7549a3a05ae401a0d7ae4e6ca703a61e1e2289ec1d18ee3772f9
                                                                                                                                                                                                                              • Instruction ID: 1146e8ea884a886ec7c11aff07058db24f39e7921042ea1cc8381a9e3fd9476a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 367b353356dc7549a3a05ae401a0d7ae4e6ca703a61e1e2289ec1d18ee3772f9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8BA194B3A042C28BF7799F19E840AFAB794FB65B88F805135DB4A57B84CB38D951C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • TranslateName.LIBCMT ref: 00007FF70AA249CD
                                                                                                                                                                                                                              • TranslateName.LIBCMT ref: 00007FF70AA24A08
                                                                                                                                                                                                                              • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF70AA127F8), ref: 00007FF70AA24A4D
                                                                                                                                                                                                                              • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF70AA127F8), ref: 00007FF70AA24A75
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLastNameTranslate$CodePageValid
                                                                                                                                                                                                                              • String ID: utf8
                                                                                                                                                                                                                              • API String ID: 2136749100-905460609
                                                                                                                                                                                                                              • Opcode ID: d9b8ad3760af016a63c72bc9a843d741a47231133edd535d7ed3e9ae3113bd32
                                                                                                                                                                                                                              • Instruction ID: 9a5740a1dc00e4420563022b72de2b0538201e0ca57d90a97cced0517fdcf0e9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d9b8ad3760af016a63c72bc9a843d741a47231133edd535d7ed3e9ae3113bd32
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C691BEB3A0874286FB24BF25D801AB9A2A4EF48B84F8441B1DA5D577C5DF3CE562C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3939093798-0
                                                                                                                                                                                                                              • Opcode ID: 698639ebde3256074987202a2cc8b981a0ae2b2705bee52486481ff24fbfc6ce
                                                                                                                                                                                                                              • Instruction ID: bb80a0423d07ed8681fda62fb270bea427659bb40e90a3bae518aaec666e553e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 698639ebde3256074987202a2cc8b981a0ae2b2705bee52486481ff24fbfc6ce
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3A718DA3F086438AFB14AB68DC10AB8A3A1BF48744F844479DA0D676D5DF3DE466C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1239891234-0
                                                                                                                                                                                                                              • Opcode ID: 33f4d05915216eab4ab632b90a56ad91ab0ee05a89d810f3c8b53b4161930c69
                                                                                                                                                                                                                              • Instruction ID: 19516fc5d9129184933f495f907f055bf71be97be87616848e287808e5d7596a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 33f4d05915216eab4ab632b90a56ad91ab0ee05a89d810f3c8b53b4161930c69
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA319177A18B8186EB20DF64EC406AEB3A4FF88758F904135EA8D43B95DF38C1468B10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                              • String ID: .$.
                                                                                                                                                                                                                              • API String ID: 3541575487-3769392785
                                                                                                                                                                                                                              • Opcode ID: 147d8d088a2ab65af6ce8502f9dfb33cdb0b941aabc59c27737b474ffebd2bbe
                                                                                                                                                                                                                              • Instruction ID: bf4cdddf329ee7e84876b4429ea37c926c9c51d32dac84cd9b142bfb9bd059af
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 147d8d088a2ab65af6ce8502f9dfb33cdb0b941aabc59c27737b474ffebd2bbe
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F541B593B1859254FA70AB65EC04AB5E291EF84BE4F858572DD4D077C4EF7CD5438320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DirectoryFileFindFirstWindows
                                                                                                                                                                                                                              • String ID: \INF\OEM*.INF
                                                                                                                                                                                                                              • API String ID: 1585389207-2728984289
                                                                                                                                                                                                                              • Opcode ID: 96e7f8943384205df238da4809613e295090238b8a99556eaef6c16c72f10844
                                                                                                                                                                                                                              • Instruction ID: a74b043d92e0d560a5126edb30c9d6ec6de22dd5f7840e8e404c3d64ecff715f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 96e7f8943384205df238da4809613e295090238b8a99556eaef6c16c72f10844
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B941A663B2C68282FE60EF20E8553BAA290EF95B54FD44171C64D877D6DF2DD4058360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorFileLastWrite$Console
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 786612050-0
                                                                                                                                                                                                                              • Opcode ID: d3beed3413ee1199dba947ae966059d4b9df67c161722cedc9c5d103b3af1309
                                                                                                                                                                                                                              • Instruction ID: d4bfb5d806a9e01e1ad5a521a6d0f21c425359d1fab80030ab417b3a215f6fac
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d3beed3413ee1199dba947ae966059d4b9df67c161722cedc9c5d103b3af1309
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 73D1EEB3B09A828AF700DB68D9445ADB7B1FB45788F944176CA4E57B89DF38D12AC310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: InfoLocaletry_get_function
                                                                                                                                                                                                                              • String ID: GetLocaleInfoEx
                                                                                                                                                                                                                              • API String ID: 2200034068-2904428671
                                                                                                                                                                                                                              • Opcode ID: 02750f415f3cd806410832db7a44b855064978a5e13e35f6515160912ac6add6
                                                                                                                                                                                                                              • Instruction ID: bead05a347704b3914b1e5dd05759f76908ded35fe4e8c41baedd07c05132e74
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 02750f415f3cd806410832db7a44b855064978a5e13e35f6515160912ac6add6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 680162A7F08B4292F700AB15FC408A9E661AF98BC0F984076EE5D17B95CF3CD5528350
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: memcpy_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1502251526-0
                                                                                                                                                                                                                              • Opcode ID: 8cea97ad10f18f43ea70dff6f68e6fc975f0f687338f3efd8ca2cf0a0ef5ac24
                                                                                                                                                                                                                              • Instruction ID: 29c15eaf1b69eca67123ea6eab0128d9c4a3040929c832103ef98703b91133d3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8cea97ad10f18f43ea70dff6f68e6fc975f0f687338f3efd8ca2cf0a0ef5ac24
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C6C1C4B3B1828687E724DF19E544A6AF791FB94B84F848135DB4E53B84DB3DE812CB40
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • GetLocaleInfoW.KERNEL32 ref: 00007FF70AA24F3C
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9F676C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF70A9F6789
                                                                                                                                                                                                                              • GetLocaleInfoW.KERNEL32 ref: 00007FF70AA24F85
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9F676C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF70A9F67E2
                                                                                                                                                                                                                              • GetLocaleInfoW.KERNEL32 ref: 00007FF70AA25050
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: InfoLocale$ErrorLast_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3644580040-0
                                                                                                                                                                                                                              • Opcode ID: e8c6a04a7efb30580b1de6acdcde22ad9448435ad199d966b2e32c4fa01e2337
                                                                                                                                                                                                                              • Instruction ID: 8669f4d575d216c5e99a358e81f945af8b5faa6ce8ff1de3b46011844de54682
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e8c6a04a7efb30580b1de6acdcde22ad9448435ad199d966b2e32c4fa01e2337
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 506180B3A086438AF764AE19ED409A9B2A1FF84744F808175D74EA36D1DF3DE4628760
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: gfffffff
                                                                                                                                                                                                                              • API String ID: 3215553584-1523873471
                                                                                                                                                                                                                              • Opcode ID: 9a7811f407a379061f5ff88b26a0f4d0f292d93459f7b1a2d23494d512ae23e6
                                                                                                                                                                                                                              • Instruction ID: de18fb507d36d059a6ac6656f7f104652b59d6ac6ed9137d86ace31c2da9b01f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9a7811f407a379061f5ff88b26a0f4d0f292d93459f7b1a2d23494d512ae23e6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AA9143A3B097C596FB15EB29D800BADA7A4AF50B80F458072DA4D873D1EB3DE507C721
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF70AA1C769
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA16A20: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF70AA169CD), ref: 00007FF70AA16A29
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA16A20: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF70AA169CD), ref: 00007FF70AA16A4E
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: -
                                                                                                                                                                                                                              • API String ID: 4036615347-2547889144
                                                                                                                                                                                                                              • Opcode ID: 26c914aef9ac55f9fac2af390a0e01635bd93ea7664d4486faf8e589a2590b3f
                                                                                                                                                                                                                              • Instruction ID: e01d432288a11f9d9accb2d249f5ab8d12bc7e72da4c750804de2649d2a572c4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 26c914aef9ac55f9fac2af390a0e01635bd93ea7664d4486faf8e589a2590b3f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 928111B3A4878556F660AF25D800B7AF6A1EF95BE0F844275DA9E43BC8DF3CD4028710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function
                                                                                                                                                                                                                              • String ID: GetSystemTimePreciseAsFileTime
                                                                                                                                                                                                                              • API String ID: 2742660187-595813830
                                                                                                                                                                                                                              • Opcode ID: 1d0520b3f6df9746826bb7b6fcba1e6990199ef5daaa10c23599dce049dd0ac3
                                                                                                                                                                                                                              • Instruction ID: 216dace97f6d882675315d6397569a1946e585070495e418bfa290a0ea6c28a7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1d0520b3f6df9746826bb7b6fcba1e6990199ef5daaa10c23599dce049dd0ac3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2AE04FD7E1980B91FA16AB91EC509B09250AF0C744EC80472EA1C092D0DF3C6997C360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ExceptionRaise_clrfp
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 15204871-0
                                                                                                                                                                                                                              • Opcode ID: 042903b91b322029902fdb30016251db946a203c4db05d47f10b001f22a1f15d
                                                                                                                                                                                                                              • Instruction ID: c41590a41f4433080958909fb7af437b18ac4d3b4b1de25882e550098095dd1f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 042903b91b322029902fdb30016251db946a203c4db05d47f10b001f22a1f15d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A6B16DB3A01B848BEB15CF29C8827ACB7A0FB44B48F558975EA5D837A4CF39D456C710
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 5eba3dce41e42bb5723036e8a9e38019e2b58d05b121c9b7702cd6f0e866c16f
                                                                                                                                                                                                                              • Instruction ID: 5c60dd473142347dba81a57797c355664ecda5e1b6761fde326867f28faa7d32
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5eba3dce41e42bb5723036e8a9e38019e2b58d05b121c9b7702cd6f0e866c16f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F002F3B3A0974640FA50BB19EC00E79E695AF45BA0FD447B8ED6D663D1EF3DA4138320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Info
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1807457897-0
                                                                                                                                                                                                                              • Opcode ID: 0d4af5a3afae456f38438869c21824332240df2c44c52117edcedc5ea83f20a3
                                                                                                                                                                                                                              • Instruction ID: 25d30a45eac4269f6dc9d462d7912b02835047be4533677de2e3789f7df68b57
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0d4af5a3afae456f38438869c21824332240df2c44c52117edcedc5ea83f20a3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C012DF63A08BC186E751DF28D804BFDB3A4FB58748F819235EB9C46292EF39E195C710
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 7e3abf74bf7bcf05ea57da7a9d2ca99921f0183db8ab875d81e5133ab0ee468f
                                                                                                                                                                                                                              • Instruction ID: cc03589442a22ac5c0ac9373a97b99bc1ab386764fa3ed12800d519885c919a5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7e3abf74bf7bcf05ea57da7a9d2ca99921f0183db8ab875d81e5133ab0ee468f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CEE18F73A04B8185F710EB65E840AEE67A4FB98784F814631DF9D67782EF38D25AC710
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e1ecf19e44403f1bf0c8ff516f15394491a0df2bb93855bb1154bab4b69c0414
                                                                                                                                                                                                                              • Instruction ID: 0c5e2c564c271bef6acde60e28775ee1d15b7e8ef0633f148093ac19577749ab
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e1ecf19e44403f1bf0c8ff516f15394491a0df2bb93855bb1154bab4b69c0414
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E851AF67B1869194F720AB62ED409BABBA4BF44BD4F944274EE9957BC5CF3CD002C700
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • GetLocaleInfoW.KERNEL32 ref: 00007FF70AA25188
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$InfoLocale
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3736152602-0
                                                                                                                                                                                                                              • Opcode ID: 2daf3a8a6570d13e4a69e0773b16970abee15f26fc3cb4f4b112bd2ae792f481
                                                                                                                                                                                                                              • Instruction ID: ab5ba62770b665de7e048b9cda0a2de26b9872ffdf40adfa699a4c08c4ccadf1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2daf3a8a6570d13e4a69e0773b16970abee15f26fc3cb4f4b112bd2ae792f481
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 843171B3E0878386FB24AB25E8417AAB2A1FF54784F809175DA5E936C5DF3CE5128710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF70AA2557B,?,00000000,00000092,?,?,00000000,?,00007FF70AA127F1), ref: 00007FF70AA24DDA
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$EnumLocalesSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2417226690-0
                                                                                                                                                                                                                              • Opcode ID: b310e04edf9a4858b7711b1bc3cd10a3b5863322fdd0602e956277415e6d3450
                                                                                                                                                                                                                              • Instruction ID: 5614483b0f5fa4248805a252eae73aef47007107fb0eecf6ff7ead052c3f1d8d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b310e04edf9a4858b7711b1bc3cd10a3b5863322fdd0602e956277415e6d3450
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4811D5A3E1864587FB149F19D440AA8B7A0EB94FA4F848136C619533C4CF78D5E2C750
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • GetLocaleInfoW.KERNEL32(?,?,?,00007FF70AA250CD), ref: 00007FF70AA25383
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$InfoLocale
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3736152602-0
                                                                                                                                                                                                                              • Opcode ID: f0e1e85cb0904cfb13678112b23ba47b692ebdb17e326b7273fc79358d1f6376
                                                                                                                                                                                                                              • Instruction ID: 3985cc4aba310777a2ac196a2b82a24eec1d3afd52ef7b8f21cbed059ff80bcb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f0e1e85cb0904cfb13678112b23ba47b692ebdb17e326b7273fc79358d1f6376
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E6112373E1C69782F7746B1AD860A7DA2A1FF00764F902171EA2A536C4DF7CD8A28710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF70AA25537,?,00000000,00000092,?,?,00000000,?,00007FF70AA127F1), ref: 00007FF70AA24E8A
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$EnumLocalesSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2417226690-0
                                                                                                                                                                                                                              • Opcode ID: e95a6f0b37c8df2f7d892436cbea75250c8106ecf43136de523b6d98b723d434
                                                                                                                                                                                                                              • Instruction ID: fc2ed23567beb2c7123ba73eabd6c39fcf7f3f0986698658a39cc4887029722e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e95a6f0b37c8df2f7d892436cbea75250c8106ecf43136de523b6d98b723d434
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4001F1B3F0828287F7106B19E840FB9B6A1EF44BA4F859271D269572D4CF7CA892C714
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF70AA18911,?,?,?,?,?,?,?,?,00000000,00007FF70AA24244), ref: 00007FF70AA17ABF
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: EnumLocalesSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2099609381-0
                                                                                                                                                                                                                              • Opcode ID: 0c79f0349c4a0605245a055538df7ef28e0d12ebb44365a436a3ebf26f8b2171
                                                                                                                                                                                                                              • Instruction ID: 816f63155c3219fa00db17937bbd3bda682c6ead629253e6a64bb95e98c58964
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0c79f0349c4a0605245a055538df7ef28e0d12ebb44365a436a3ebf26f8b2171
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3AF06DB3B08A4183F744EB29EC409AAB365EFD8780F845175EA0D837A4CF7CD5A28310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: GetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA175F7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA175E8: SetLastError.KERNEL32(?,?,?,00007FF70AA27232,?,?,?,?,?,?,?,?,?,?,?,00007FF70AA2712B), ref: 00007FF70AA17695
                                                                                                                                                                                                                              • EnumSystemLocalesW.KERNEL32 ref: 00007FF70AA24CFF
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$EnumLocalesSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2417226690-0
                                                                                                                                                                                                                              • Opcode ID: 37355801d101d15e73ed97373d1325733675572864da2e4454ebca36426ced02
                                                                                                                                                                                                                              • Instruction ID: 3eac77d0ed2c250beca32fc03ecfc2e2800158ea42569776d0f57f1ec9375e07
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 37355801d101d15e73ed97373d1325733675572864da2e4454ebca36426ced02
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 40F054A3A0874582EB116F69E840769FBE1EF94BB4F859271D668432D5DF78C4A18700
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: EnumLocalesSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2099609381-0
                                                                                                                                                                                                                              • Opcode ID: a3705e45a4f268f33fd337935757e13d22bf4229caecad54140b34f6bcf306e8
                                                                                                                                                                                                                              • Instruction ID: 09e6f25b2c7e76623f0594cb3b0f4447efe12ceb1d7e2eaeb3491a18254909f8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a3705e45a4f268f33fd337935757e13d22bf4229caecad54140b34f6bcf306e8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F7E092E2B08A0182FB80EB15EC445267361AF9CBD0FC05071E90D47BA4DF7CD1528310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: EnumLocalesSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2099609381-0
                                                                                                                                                                                                                              • Opcode ID: ae0b7570886a34609fae074dd6b97874d1210b0956683149f338bd6385165f94
                                                                                                                                                                                                                              • Instruction ID: dd7f685f524f783737491cb992ada0f6537ef6f18e3624d8ad43d36c8adff0d6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ae0b7570886a34609fae074dd6b97874d1210b0956683149f338bd6385165f94
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E1E04FA2E08A4292F644A751EC54A76A361AFE9791FC011B5F90D07BA09FBC92578310
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 0-4108050209
                                                                                                                                                                                                                              • Opcode ID: 3298bf67b1f0c2be8d215b1ef692e2ed5dc4bc9733db5a3918195495d45e186b
                                                                                                                                                                                                                              • Instruction ID: 509682f7d373e9f33f651ad315e437c8f248f1176167cf5fe09d15dc1489c474
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3298bf67b1f0c2be8d215b1ef692e2ed5dc4bc9733db5a3918195495d45e186b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8E8107A3E1820346FB64BA39C800E7AA690EF40744FC49471DD8D976D8CF2DE847EB65
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 0-4108050209
                                                                                                                                                                                                                              • Opcode ID: e4dced8d68a820e1a1d04cc35ed3aba3688103cc88bf653a2760244175f13c08
                                                                                                                                                                                                                              • Instruction ID: ab088eb11cbc0fe829e37bbd4d937e5f196ec9d1d5e57e40012ae5e619b61913
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e4dced8d68a820e1a1d04cc35ed3aba3688103cc88bf653a2760244175f13c08
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AC71D693A0C74647FAA4AE39C800FBAE791AF55744F8401B5CE499B6D9CF2DE4438731
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 3215553584-4108050209
                                                                                                                                                                                                                              • Opcode ID: 1601ebb4a085dcb7d739bdd4eed40b615d2130470465d1318d301927c9e7c833
                                                                                                                                                                                                                              • Instruction ID: fd75217bc57507ed43c44534ba3f3521c2adb280368fcf2df311f2b253b0bddc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1601ebb4a085dcb7d739bdd4eed40b615d2130470465d1318d301927c9e7c833
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B771E7A7F1820346FAA8BA35C844E79A290EF41744FC4D171DD89876D9DF2DF8438B25
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 3215553584-4108050209
                                                                                                                                                                                                                              • Opcode ID: d97ce31363821d7e59ff7b95ab789dce6dae42c5463c516f708e9ad5742ae19f
                                                                                                                                                                                                                              • Instruction ID: 68888cd2fc12a99f224b83e4106ec0d845ee4303d56a9eabc3a1fee92f90a245
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d97ce31363821d7e59ff7b95ab789dce6dae42c5463c516f708e9ad5742ae19f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8271C697E1824342FA64BA39D800EB9A692EF40744FC49479DD4DC76D9CF2EF8438B25
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 3215553584-4108050209
                                                                                                                                                                                                                              • Opcode ID: 77e714d55eda6aa17527c73dbb794f803213f9d7578e7f16155016f531fb6458
                                                                                                                                                                                                                              • Instruction ID: 3bd0dc943d0160e1dc873905a4595625acf28aec1e9f0870063e4900ca2afcf6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 77e714d55eda6aa17527c73dbb794f803213f9d7578e7f16155016f531fb6458
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B071E297B182424BFA64AA39D800FB9A791BF8D744FC411B1CF49876D9CF2DE8438361
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 3215553584-4108050209
                                                                                                                                                                                                                              • Opcode ID: b9c2a45f343b5c87b971f1cf71d6bc23156fee6f057cfd2d8e17317b84542c78
                                                                                                                                                                                                                              • Instruction ID: 12cdc43e8f40c99e01bd46fb7a9c67ad36425f6d7affb13d02e99f8ac819ccbb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b9c2a45f343b5c87b971f1cf71d6bc23156fee6f057cfd2d8e17317b84542c78
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DE71E393A1824646FE64AA39D804FBAE7919F41744FC409B6DD498F2CACF2DE8438731
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 0-4108050209
                                                                                                                                                                                                                              • Opcode ID: 5db9519db1cddfaa4ec0483ba47a9384cbcec5f952c5f7433adf20521fb9aad9
                                                                                                                                                                                                                              • Instruction ID: 303ea93aaa49714f4d2d64ee3bcf7e4594d15239f3ebe58304a71a0ceab4afa8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5db9519db1cddfaa4ec0483ba47a9384cbcec5f952c5f7433adf20521fb9aad9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9B710893E0C28247F6686939C800FBADB91BF4A744FC415B5DE48976D9CF2DE8478321
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 3215553584-4108050209
                                                                                                                                                                                                                              • Opcode ID: 90d249107c8bf112e4df0f58921203419683959deed1fc803af336b87ec38021
                                                                                                                                                                                                                              • Instruction ID: 15fe59aa3c80f707b96749edba30a66ea96c2faca2ccfcabe8807901442022b1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 90d249107c8bf112e4df0f58921203419683959deed1fc803af336b87ec38021
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0061D093A0C24247FA646A39D800FBAD791AF49744FC401B9DA89D76DACF2DFC438761
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                                              • API String ID: 3215553584-4108050209
                                                                                                                                                                                                                              • Opcode ID: 39f1ec5bb102f363b1fb50bc343c603d561d49684c5f7139075a3ba3241001c7
                                                                                                                                                                                                                              • Instruction ID: 8aecd10aee20ed3337758f326afbbd25847b1ea2caab637caf82c56e88cf8bc7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 39f1ec5bb102f363b1fb50bc343c603d561d49684c5f7139075a3ba3241001c7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5D612793A0C24247FA646A39D800FBAD791BF49744FC411B1DE49976DACF2DE8838369
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00007FF70AA2D20D
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA17978: HeapAlloc.KERNEL32(?,?,00000000,00007FF70AA177C1,?,?,00000000,00007FF70AA16B85,?,?,?,?,00007FF70A9F6CA8), ref: 00007FF70AA179CD
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA179F8: HeapFree.KERNEL32(?,?,?,00007FF70AA232DC,?,?,?,00007FF70AA236FF,?,?,00000000,00007FF70AA23F44,?,?,?,00007FF70AA23E77), ref: 00007FF70AA17A0E
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA179F8: GetLastError.KERNEL32(?,?,?,00007FF70AA232DC,?,?,?,00007FF70AA236FF,?,?,00000000,00007FF70AA23F44,?,?,?,00007FF70AA23E77), ref: 00007FF70AA17A20
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA2C088: _invalid_parameter_noinfo.LIBCMT ref: 00007FF70AA2C0B6
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 916656526-0
                                                                                                                                                                                                                              • Opcode ID: bdc19389d7424b13ec30ac8dba11af17a85217a491f899bfad80f2150ff4fb30
                                                                                                                                                                                                                              • Instruction ID: 60bda92ae01d20ff2aa8e5160d64c93c768383eb1daea617c8342dc00cf77e50
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bdc19389d7424b13ec30ac8dba11af17a85217a491f899bfad80f2150ff4fb30
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2941B6A3B0928346FAA06A5AEC51E7AE6806F457C0F844575ED4D57BC6EF3CE4128720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: HeapProcess
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 54951025-0
                                                                                                                                                                                                                              • Opcode ID: ad7aa9be03b136a8b86c241834f3511267ad507e402bf7d5c4e724964e796d7d
                                                                                                                                                                                                                              • Instruction ID: 41b5e76a34766b69d13d8626c0b1d6464767a91689f5616c2288cab79ca0db98
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ad7aa9be03b136a8b86c241834f3511267ad507e402bf7d5c4e724964e796d7d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BDB09262E07A06C2FA087B16AC8262563A4BF9C701FD440B8D10C42360DF2C20B65721
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLastNameTranslatetry_get_function$CodePageValid_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3827717455-0
                                                                                                                                                                                                                              • Opcode ID: 3f501d995b418e08b38f9edfabc86e8d3cac6d216730b2c8e5cca3346fb82f23
                                                                                                                                                                                                                              • Instruction ID: 9b3c0c2810c2bcd26564f53b1cd25080115eab08cbb79f8bf97af3e721b76cb5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f501d995b418e08b38f9edfabc86e8d3cac6d216730b2c8e5cca3346fb82f23
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 93E1A0A3A0868255FB64AB25DC10BFAA7A0FF94788F804075DE8D477C5EF3CD54A8720
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$CurrentFeatureInfoLocalePresentProcessProcessortry_get_function
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 959782435-0
                                                                                                                                                                                                                              • Opcode ID: d56ceefded4baa13521f4f609e87cf593d89bf52db51a349a613b99c63d43d38
                                                                                                                                                                                                                              • Instruction ID: 26893ef75fefc29c459e925167d909730984a16a3d2a28dda03c138cd99ade29
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d56ceefded4baa13521f4f609e87cf593d89bf52db51a349a613b99c63d43d38
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B1B118A3A1864643FB54AF25D801AB9B391FF48B48F804175DA4E936C9DF3CD862C750
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c849b448950fe45e02ea9840edd387fd791acb62ee3a335009b810c1d76624ef
                                                                                                                                                                                                                              • Instruction ID: d3c77d9bae6d08bc385cfb7e194f2d1a1aa8c4c9c62870d8f005940a7aaec4ef
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c849b448950fe45e02ea9840edd387fd791acb62ee3a335009b810c1d76624ef
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FB81B5A7E182034BF7A8BE35D810EBDA290EF44B44FC49175DE49872D9CF2DE8478661
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3215553584-0
                                                                                                                                                                                                                              • Opcode ID: b9fb1412a969e83ffd452d5568cc414aa092d552430bd97b87d94c05d621c441
                                                                                                                                                                                                                              • Instruction ID: e7c2e3f8b452c0a25a7d0b4ee00175f8f98f381b88583c207796129b6b0dd33f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b9fb1412a969e83ffd452d5568cc414aa092d552430bd97b87d94c05d621c441
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2881F5A7A1820247FB69BA39D800EB9A290FF48744FC55176DF49D72D9CF2DE8478260
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3215553584-0
                                                                                                                                                                                                                              • Opcode ID: fda6414e0ca285d7d3c641e812502447004db9316ab5bd4eb360a61517eae451
                                                                                                                                                                                                                              • Instruction ID: 29f0c567a3030e5bc5d498fad131496447a47dbe0b8b9ad404a384b17344473e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fda6414e0ca285d7d3c641e812502447004db9316ab5bd4eb360a61517eae451
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 21810897E182034AFBA8BA39C810EB9A690EF05744FC49175DD49C72D9CF2DE8478F25
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorFreeHeapLast
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 485612231-0
                                                                                                                                                                                                                              • Opcode ID: b28074559aeab5e219c3ff33a27b5a6f1737238eeca4a21f3c0611eb71f637c7
                                                                                                                                                                                                                              • Instruction ID: c95a4376ffb041c38a4f5a5b7543a4347673c31e25ff224ee544af5375b9d88b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b28074559aeab5e219c3ff33a27b5a6f1737238eeca4a21f3c0611eb71f637c7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DC41C0A3714A5496FB44DE2ADD14969B3A1AB48FD4F899136EE0D97B98DF7CC0428300
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 12c6a83125842657aa20d81587556ef437bc21cebfee6fedb56fe02cecd375e9
                                                                                                                                                                                                                              • Instruction ID: 985eaea3702849b52ae84cb159b06382acdc3a012255e4b959b6c441268ec1fc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 12c6a83125842657aa20d81587556ef437bc21cebfee6fedb56fe02cecd375e9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5FF068B2B182D58AEB949F2CE842A7A77D0EB58380F908179E58D83B44D77C90618F14
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 075bea70bcd4d8cceaabd6cf7978304fe9b2e4df568cf5a1b525f3513ad4298d
                                                                                                                                                                                                                              • Instruction ID: 9bb9723b6f9c3618bd9dab75d372c1e7ae4c84c64df2cb8743b6c62b1a6c50c8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 075bea70bcd4d8cceaabd6cf7978304fe9b2e4df568cf5a1b525f3513ad4298d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 83A00167A1C842D2F645AB80EC54420A360FF64305F8084B1E00D910A1DF2DA4018220
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::operator+Name::operator+=$Decorator::getName$Name::Name::operator=$Name::doPchar$DimensionSigned$DataDecoratedEncodingStringSymbolType
                                                                                                                                                                                                                              • String ID: `anonymous namespace'$`string'$operator
                                                                                                                                                                                                                              • API String ID: 2020783597-815891235
                                                                                                                                                                                                                              • Opcode ID: aede423d4dabe3da59b1e03a92da396b2b5059be44e77dc81dd73a52e45e54ff
                                                                                                                                                                                                                              • Instruction ID: db33c81846097360db02a22951237ee92d3b990d4103efefb360e311b280aaf0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aede423d4dabe3da59b1e03a92da396b2b5059be44e77dc81dd73a52e45e54ff
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 38227E63B2CA6698FB14EB60DC901FCA761AF2478CFD440B6DA0D97696DF68E445C320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::operator=$Name::operator+Name::operator+=$Decorator::getNameName::Type$DataName::doPchar
                                                                                                                                                                                                                              • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $bool$char$char16_t$char32_t$const$double$float$int$long$long $short$signed $unsigned $void$volatile$wchar_t
                                                                                                                                                                                                                              • API String ID: 1480303775-3737837666
                                                                                                                                                                                                                              • Opcode ID: 5336914cda9eb7d28fc33c9881fb9f0eefb368431fddd4b441b46ed6f18de0a2
                                                                                                                                                                                                                              • Instruction ID: a6691637812ab297cf856dc4f386cf10bf62d08cb68a0ba77a6ac963f879bc71
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5336914cda9eb7d28fc33c9881fb9f0eefb368431fddd4b441b46ed6f18de0a2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23D14BA3F2C65398FB54EB54DC806BCA370BF24348FD044B2E94D96696DF6CE54583A0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Decorator::get$Name::operator+=$DimensionSigned$Name$Name::operator+$DecoratedName::$DataName::doName::getPcharStringType
                                                                                                                                                                                                                              • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-
                                                                                                                                                                                                                              • API String ID: 283215372-4167119577
                                                                                                                                                                                                                              • Opcode ID: 7b301788f1c808b6dbcb0f6369f2a7d1d94637bd6059d460935599cb42e21360
                                                                                                                                                                                                                              • Instruction ID: d3b2f6073262562e914ea57297026401fa5cf834a78c535ad0e5177aa6090a1d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7b301788f1c808b6dbcb0f6369f2a7d1d94637bd6059d460935599cb42e21360
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1FB16C63F2D64398FB10EB64CC452FCA7A55F94788FD001B6D90D86A97EF6CA50AC320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::operator+$Decorator::get$DataIndirectNameName::Name::doName::operator+=PcharScopeType
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3173522582-0
                                                                                                                                                                                                                              • Opcode ID: 0f8fc59074820430211e5edccfc92087bcdcd104a7c28eeafd2b21ab4534d517
                                                                                                                                                                                                                              • Instruction ID: cab23ed5a67295b20c67f663985f6c6a74d1af702b1c4afab3e6c7dac6de9253
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0f8fc59074820430211e5edccfc92087bcdcd104a7c28eeafd2b21ab4534d517
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5D026D77B18A82AAFB10EF64D8401ECB7A1AF5474CF844076EA4D97A9ADF38D505C360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19307
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19326
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: GetProcAddress.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA18300
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19345
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: LoadLibraryExW.KERNELBASE(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA1824B
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: GetLastError.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA18259
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: LoadLibraryExW.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA1829B
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19364
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: FreeLibrary.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA182D4
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19383
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA193A2
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA193C1
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA193E0
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA193FF
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA1941E
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function$Library$Load$AddressErrorFreeLastProc
                                                                                                                                                                                                                              • String ID: AreFileApisANSI$CompareStringEx$EnumSystemLocalesEx$GetDateFormatEx$GetLocaleInfoEx$GetTimeFormatEx$GetUserDefaultLocaleName$IsValidLocaleName$LCIDToLocaleName$LCMapStringEx$LocaleNameToLCID
                                                                                                                                                                                                                              • API String ID: 3255926029-3252031757
                                                                                                                                                                                                                              • Opcode ID: f5ddb8dc0f958fd9ea081183d1d9282a99c58eacf92a6cfce449543f48408e78
                                                                                                                                                                                                                              • Instruction ID: df47c5032cfc14127be10bd1ca05223b491d374dc590565f2406a58d0bdaf211
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f5ddb8dc0f958fd9ea081183d1d9282a99c58eacf92a6cfce449543f48408e78
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1B313BE7D08A8BA0F605FB54EC519F4A321AF48344FC054B3E40E462E19F7CAA5BD7A1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Get_$Des_Res_$Conf_Log_$First_Free_Handle$Data_Next_$DetailDeviceInfoListNode_SetupSize_Status_
                                                                                                                                                                                                                              • String ID: DMA : %u$IO : %04I64x-%04I64x$IRQ : %u$MEM : %08I64x-%08I64x
                                                                                                                                                                                                                              • API String ID: 2957808706-3427375868
                                                                                                                                                                                                                              • Opcode ID: a4e06f8e4a64dca8354c6e1283bba188da2d5f0b0782a176430cef695ac593de
                                                                                                                                                                                                                              • Instruction ID: f1890312fef5a71e1d168a7e6a6e926b3e550611b5088bdfa76f938a2a0b269c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a4e06f8e4a64dca8354c6e1283bba188da2d5f0b0782a176430cef695ac593de
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2891647372C68286F750EF15E84466AE7A0FFA5B48F800075EA4D8769ADF3DE445CB20
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Close$OpenService$ClassHandleSetup$ErrorFromGuidsLastManagerName_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: LowerFilters$UpperFilters$lower$upper
                                                                                                                                                                                                                              • API String ID: 159866419-3449112408
                                                                                                                                                                                                                              • Opcode ID: 04d78bdca285827dd18647d1427b74e056b8c47343acbe8526b1cd4a7cfcbc6c
                                                                                                                                                                                                                              • Instruction ID: 5c559b2899f6b3b1d695d00ff6c5e2f545162794ab39bb347503e0a86a1456aa
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 04d78bdca285827dd18647d1427b74e056b8c47343acbe8526b1cd4a7cfcbc6c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 67E1D123B2DA4241FA60EB15DD4037AE2A5EF64B98F844175EE1E8B7D6DF3DE4418320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Decorator::getNameReplicator::operator+=Template
                                                                                                                                                                                                                              • String ID: generic-type-$template-parameter-
                                                                                                                                                                                                                              • API String ID: 2731555906-13229604
                                                                                                                                                                                                                              • Opcode ID: 84b3677d49f92f823a7e74a3a09ad7f2eb3bf894bac47f523860a981e25c4147
                                                                                                                                                                                                                              • Instruction ID: 409719c2dfd97dd0e17d0bd7196e64479cac18d31b9361b03375c5baec71c01a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 84b3677d49f92f823a7e74a3a09ad7f2eb3bf894bac47f523860a981e25c4147
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 16918C63B28A4789FB10EB64DC905BCB7A1AF54B88FD001B6DA0D97795DF2CE506C360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$Driver$Info$InstallParams$DeviceEnumFormatListTime$BuildDateDestroyDetailErrorFileFreeLastLocalMessageSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2668181066-3916222277
                                                                                                                                                                                                                              • Opcode ID: e4b5dfb2d01c01c868df09e416ecf3eefc922ffbc0b423e26137771d3025f2ca
                                                                                                                                                                                                                              • Instruction ID: 38ffdae1d34156e9a36f2c75cbdb738aee0f92fc569d3354aac5c6a9e6ea54e8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e4b5dfb2d01c01c868df09e416ecf3eefc922ffbc0b423e26137771d3025f2ca
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CDC14032B2C28246F714BB61D8157EAA291EF94788F804475EA4E877C7CF7EE54087A0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FrameHandler3::Unwind$BlockException$CatchDestructExecutionFramesHandlerHelperIs_bad_exception_allowedMatchNestedObjectSearchStateThrowTypestd::bad_alloc::bad_alloc
                                                                                                                                                                                                                              • String ID: csm$csm$csm
                                                                                                                                                                                                                              • API String ID: 15165021-393685449
                                                                                                                                                                                                                              • Opcode ID: 21b97b16db538992eb6a75333495f7bcb45038915a3eb3cb518b00d563e8fba0
                                                                                                                                                                                                                              • Instruction ID: 2adb64581e8c8e311ebd8f35a3436854dde7b89f6648bf301e7671daa300a5da
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 21b97b16db538992eb6a75333495f7bcb45038915a3eb3cb518b00d563e8fba0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00E15A63A186428AFB60AB65D8403AEB7A0FF54798F540175EE9D8BB59CF3CE090C610
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Des_Res_$Get_$Data_Free_HandleNext_$Size_
                                                                                                                                                                                                                              • String ID: DMA : %u$IO : %04I64x-%04I64x$IRQ : %u$MEM : %08I64x-%08I64x
                                                                                                                                                                                                                              • API String ID: 1110773400-3427375868
                                                                                                                                                                                                                              • Opcode ID: 9e4a8363610eefb0b6cbcea2d3461c166d1163f148688767d300006fdf73812f
                                                                                                                                                                                                                              • Instruction ID: 274dd9896ec5577596458e5c98aeca18b3fe0a22a116170e807977240c3a1fe0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9e4a8363610eefb0b6cbcea2d3461c166d1163f148688767d300006fdf73812f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DE414F63B2C64282FB50EF15E954679A360FFA4B88F8440B5EA4D87796DF3CE845C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$Driver$DeviceFileInfoInstallParamsQueue$ListScan$BuildCallClassCloseDestroyDetailEnumErrorFormatFreeInstallerLastLocalMessageOpenSelected
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1606212837-0
                                                                                                                                                                                                                              • Opcode ID: e12b59f62743ec06b6094670a4a11f57fde35331bb7a5217e71e5602add53916
                                                                                                                                                                                                                              • Instruction ID: e0068f2f53c5351395a16c5d45d4b0cadafffae1e45b46e7b5ebf48452ada4eb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e12b59f62743ec06b6094670a4a11f57fde35331bb7a5217e71e5602add53916
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 10619023B2C68246F720EF21EC506E9A3A4FF84B98F840275EA1D47AD6CF3DD5058720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Library$AddressErrorFreeFullLastLoadNamePathProc
                                                                                                                                                                                                                              • String ID: SetupUninstallOEMInfW$setupapi.dll
                                                                                                                                                                                                                              • API String ID: 3805412813-3713901415
                                                                                                                                                                                                                              • Opcode ID: 07190c82b7a186e3b5898b35f52d877f32724abc198f9c48db99fcc8c26ec65d
                                                                                                                                                                                                                              • Instruction ID: b3ae7e987d1da57157843cf2006eb56daaa8eb9cefc5f13ddd764b5172dded4d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 07190c82b7a186e3b5898b35f52d877f32724abc198f9c48db99fcc8c26ec65d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 64318227B1C68643FB60AB10EC5937AA291EF89749F800075D94E877D6CF3DE8458760
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Exception$DestructHelperIs_bad_exception_allowedMatchObjectThrowTypestd::bad_alloc::bad_alloc
                                                                                                                                                                                                                              • String ID: csm$csm$csm
                                                                                                                                                                                                                              • API String ID: 3999431683-393685449
                                                                                                                                                                                                                              • Opcode ID: dd461791980e8857ea159d38e58e30428d4de1eaec1c9c9603251b4acd30a3b7
                                                                                                                                                                                                                              • Instruction ID: 868e290798ea3221677c0e6e1b7ae50d62b03969d4f216c7cc622c66962b1774
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dd461791980e8857ea159d38e58e30428d4de1eaec1c9c9603251b4acd30a3b7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 81E18E73B286828AFB10EF25D8803AEBBA0FF54748F544275DA9D87656CF38E585C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$Device$Info$ClassCreateList$CallDestroyFullInstallerNamePathPropertyRegistry
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1846165353-3916222277
                                                                                                                                                                                                                              • Opcode ID: cea8426861f3347b505c897b4f246ebb9bfdbc3591874b8a41b436473b598dc7
                                                                                                                                                                                                                              • Instruction ID: 0dfa635338d20762443030f5865e7b92ea8f9636dbdbed6eadb7b36af8f3e978
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cea8426861f3347b505c897b4f246ebb9bfdbc3591874b8a41b436473b598dc7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AE51CF63B18A8182FB20DB10E8007AAB3A5FF94B94F944232DA9D836D5DF7DE545CB10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: NameName::Name::operator+Name::operator+=$Decorator::getDimensionName::doPcharSigned
                                                                                                                                                                                                                              • String ID: `template-parameter$void
                                                                                                                                                                                                                              • API String ID: 1951524168-4057429177
                                                                                                                                                                                                                              • Opcode ID: 7a7c9e4356da7ebb837bbe34803b1ef7ec7b8755a3141d29af5874025b868cc2
                                                                                                                                                                                                                              • Instruction ID: a57d804906ccbb360ade2d732f06f73ccced8d15ca4af7031dae41aac51ebe13
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7a7c9e4356da7ebb837bbe34803b1ef7ec7b8755a3141d29af5874025b868cc2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9A314263F28A4289FB00EB54DC506B9A365BF58788FD40075D90D9BB96DF7CE405C360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: NameName::$Name::doName::operator+Pchar
                                                                                                                                                                                                                              • String ID: `non-type-template-parameter
                                                                                                                                                                                                                              • API String ID: 3026640183-4247534891
                                                                                                                                                                                                                              • Opcode ID: 2045f689735eeea40cce7efe3b8163e352433e1db3c7d53e5d39b0a4b2283e44
                                                                                                                                                                                                                              • Instruction ID: 6a21580e100bec6cd376efb556251c63181c9f0728281b0547010c1eb9ca3aef
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2045f689735eeea40cce7efe3b8163e352433e1db3c7d53e5d39b0a4b2283e44
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A1419073B2D69299F700EB11DC801BCB3A4BF60B88FD040B5DA4D87A86DF28E925C310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FreeLibrary$AddressAttributesFileFormatFullLoadLocalMessageNamePathProc
                                                                                                                                                                                                                              • String ID: UpdateDriverForPlugAndPlayDevicesW$newdev.dll
                                                                                                                                                                                                                              • API String ID: 3199543795-3767700378
                                                                                                                                                                                                                              • Opcode ID: 04ab7d4148ff324d2fd50ef0ea174a2fd79d77ffbdc2d0a2a02e6489278d7139
                                                                                                                                                                                                                              • Instruction ID: 1ae86bfa8b931cfdfefe15a6531643a520bd2ca2065aaf8325ed48bf66c68530
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 04ab7d4148ff324d2fd50ef0ea174a2fd79d77ffbdc2d0a2a02e6489278d7139
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5F318527B1CA8286FB60EB10EC947A9A364FF98B44F844075DA4D43795DF3CD449C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::operator+=$Decorator::getNameName::operator+$Name::Name::operator=ScopeScoped
                                                                                                                                                                                                                              • String ID: void
                                                                                                                                                                                                                              • API String ID: 3176039966-3531332078
                                                                                                                                                                                                                              • Opcode ID: 9e892f4fd707f0d60684168cfb52e33d9422594bf1c05951a142ce3f47b87fe0
                                                                                                                                                                                                                              • Instruction ID: 6efbc9faf641bb2a2a33d7d7f5b7f2500d2ce5d6fcb46cd5da196ab5ad5da4f8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9e892f4fd707f0d60684168cfb52e33d9422594bf1c05951a142ce3f47b87fe0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AF116563F2C54285FF20EB14EC50279A360BFA8749FC45071E58D866A6DF2CE506C761
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3215553584-0
                                                                                                                                                                                                                              • Opcode ID: 3e9133d60d70ee4b184cf4df9feb1deb47fa9a1110e34a9b0a205f5e93016ed5
                                                                                                                                                                                                                              • Instruction ID: 3e370a632bdda2346336b353d67e758681c727d2141328c8476d4750f8531f9a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3e9133d60d70ee4b184cf4df9feb1deb47fa9a1110e34a9b0a205f5e93016ed5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D8C1E1A3A0C68655F660AB19DC40ABEBB60EF81B80FC44171DA4D177D5DF7DE8768320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetupDiGetDeviceInfoListDetailW.SETUPAPI ref: 00007FF70A9E672F
                                                                                                                                                                                                                              • SetupDiOpenClassRegKeyExW.SETUPAPI ref: 00007FF70A9E676F
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32 ref: 00007FF70A9E690B
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4C30: RegQueryValueExW.ADVAPI32 ref: 00007FF70A9E4C83
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4C30: GetLastError.KERNEL32 ref: 00007FF70A9E4C94
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4C30: RegQueryValueExW.ADVAPI32 ref: 00007FF70A9E4CF6
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4770: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00007FF70A9E10DD), ref: 00007FF70A9E47B7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4770: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00007FF70A9E10DD), ref: 00007FF70A9E480B
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: QuerySetupValue$ClassCloseDetailDeviceErrorFormatFreeInfoLastListLocalMessageOpen
                                                                                                                                                                                                                              • String ID: %s$LowerFilters$UpperFilters
                                                                                                                                                                                                                              • API String ID: 1933970874-1836264166
                                                                                                                                                                                                                              • Opcode ID: 2c9d6f15fb4d5093753cc64694a3814026eec7a59d5bbe1ac40501dd433a88c3
                                                                                                                                                                                                                              • Instruction ID: 3eea51961ee5424882076970f1349a61cb1e42723621017b6e64731b68c2bf37
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2c9d6f15fb4d5093753cc64694a3814026eec7a59d5bbe1ac40501dd433a88c3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1C515113B2C28646FA54FB51EC153BA91819FA4B98FC441B4DA0D8B7C7DF6DE84142B1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ClassSetup$BuildInfoList$DescriptionErrorFromGuidLastName
                                                                                                                                                                                                                              • String ID: %-20s: %s
                                                                                                                                                                                                                              • API String ID: 3437477559-1251934994
                                                                                                                                                                                                                              • Opcode ID: 8de683dbc796dd8caca86f2723ecdf9223d82be46d02b5834d92cca158fced3c
                                                                                                                                                                                                                              • Instruction ID: f707ab29c1df8f1b2c92e4c0845b5c0f173b4e3793f1b86e693e0862dd7d4d00
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8de683dbc796dd8caca86f2723ecdf9223d82be46d02b5834d92cca158fced3c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A8517063B2C68286FA60EB10E8447AAB3A0FF94B88F945175DA8D87B85DF3CD505C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::doName::operator+Name::operator+=Pchar$NameName::Name::append
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3659116837-0
                                                                                                                                                                                                                              • Opcode ID: 6aaf8ef8ab975a96cade839fcc4cba8efc94d6294a4ba3211e0c36a2a6d5e19c
                                                                                                                                                                                                                              • Instruction ID: 0c30ad7b244ce209e700bbe8f31d7abfd724f7ce75a4f9232e5ed8fc510d4136
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6aaf8ef8ab975a96cade839fcc4cba8efc94d6294a4ba3211e0c36a2a6d5e19c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 24614B73B28A5289F711EF24EC807A8A7A1AF54748F948479EA0D837A6DF7DD445C310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FileModuleName_set_error_mode
                                                                                                                                                                                                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                                                                                                                                              • API String ID: 3581924421-4022980321
                                                                                                                                                                                                                              • Opcode ID: 0d1e8a8cf0d7e4a4f35967af43162b7572eefee810724939d3ab0ebac19dc9a6
                                                                                                                                                                                                                              • Instruction ID: 1252e5a7287734e115edacee0aa12bcba16aa7a82844c6c5d4f1fc84793a3a5e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0d1e8a8cf0d7e4a4f35967af43162b7572eefee810724939d3ab0ebac19dc9a6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9241E2A3B0864259FA64AB22EC00DBAE351AF84BD4FC04172EE1D977D1DF3CE1078220
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$ClassDeviceInstallParams$CallDetailDevice_Get_InfoInstallerList
                                                                                                                                                                                                                              • String ID: %-60s: %s
                                                                                                                                                                                                                              • API String ID: 4184553637-3470069224
                                                                                                                                                                                                                              • Opcode ID: c50b428a501a26c9097843eac2ab180f505a000ca60ac8a98767d06fd166e556
                                                                                                                                                                                                                              • Instruction ID: 8a6fa0c1655196e69d86d2b0174ebe7aab842f11b96c929fce88f11a7934316f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c50b428a501a26c9097843eac2ab180f505a000ca60ac8a98767d06fd166e556
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C315EB2B1C68292F760DF11E8447AAB760FF94B89F804075CA4E47A95CF3DD456CB10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Library$AddressFreeLoadProc$AttributesFileFullNamePath
                                                                                                                                                                                                                              • String ID: SetupSetNonInteractiveMode$setupapi.dll
                                                                                                                                                                                                                              • API String ID: 1784877336-1268865691
                                                                                                                                                                                                                              • Opcode ID: 46b5fed04645d8eac7faa08d99b50c110e1da90dcc4f8194fdf02fdc9e3b2f99
                                                                                                                                                                                                                              • Instruction ID: 86b843c814330d05780694bd20738ad6f3e58e28a8e6995e2f288908c5e6cc3b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 46b5fed04645d8eac7faa08d99b50c110e1da90dcc4f8194fdf02fdc9e3b2f99
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6D215A27B1CB8183EA10AB16F840869E390BF99FD5F801074EE8D47B65CF3CE0428B24
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                                                                                                              • String ID: CONOUT$
                                                                                                                                                                                                                              • API String ID: 3230265001-3130406586
                                                                                                                                                                                                                              • Opcode ID: b8a696af87e1db244be29ab8bf7f91a733210b6ee2ef81bc7abc92eec04a5109
                                                                                                                                                                                                                              • Instruction ID: df61a683c827ac9a2aa4d98ddb724a0a8cf5896a2feaed604e8ca6a86538baf2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b8a696af87e1db244be29ab8bf7f91a733210b6ee2ef81bc7abc92eec04a5109
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 73119A63B18B4186F350AB06FC44B29A3A4BF88BE5F800274EA1D87BD4CF7CD8558750
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                                                                                                                              • String ID: CONOUT$
                                                                                                                                                                                                                              • API String ID: 3230265001-3130406586
                                                                                                                                                                                                                              • Opcode ID: 7293e43c7665d0d01c90415b99719ea9fa37c371d7253cfd48f9f2110afdc670
                                                                                                                                                                                                                              • Instruction ID: 273c1b84991a0891503f09e82ccb18ec45ef373ef91cc18993c5d16273e78a81
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7293e43c7665d0d01c90415b99719ea9fa37c371d7253cfd48f9f2110afdc670
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F2115BA3A08B4282F7509B55F814B29A360FF88BA9F904274EA5D477D4CF7CD4568720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetupDiGetDeviceInfoListDetailW.SETUPAPI ref: 00007FF70A9E3B8A
                                                                                                                                                                                                                              • CM_Get_Device_ID_ExW.SETUPAPI ref: 00007FF70A9E3BB9
                                                                                                                                                                                                                              • CM_Get_DevNode_Status_Ex.SETUPAPI ref: 00007FF70A9E3BE1
                                                                                                                                                                                                                              • SetupDiSetDeviceRegistryPropertyW.SETUPAPI ref: 00007FF70A9E3E64
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4770: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00007FF70A9E10DD), ref: 00007FF70A9E47B7
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E4770: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00007FF70A9E10DD), ref: 00007FF70A9E480B
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DeviceGet_Setup$DetailDevice_FormatFreeInfoListLocalMessageNode_PropertyRegistryStatus_
                                                                                                                                                                                                                              • String ID: %-60s:
                                                                                                                                                                                                                              • API String ID: 1934003045-769737362
                                                                                                                                                                                                                              • Opcode ID: de8e9d4bb21c2a1e4e45b1568ffa61b4194d45a09024fb21d31a3d48b576b7e1
                                                                                                                                                                                                                              • Instruction ID: 7dbdc751bd206dae298ea7e535ca91e0ea97cd8e48f4d4f3af7df7a0e290a1c8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: de8e9d4bb21c2a1e4e45b1568ffa61b4194d45a09024fb21d31a3d48b576b7e1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3FB18623B2CA4682FA20EB15E84067AB7A4FF64B88F844175DE5E8B796DF3CD4518710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Name::operator+=$Replicator::operator+=
                                                                                                                                                                                                                              • String ID: ...
                                                                                                                                                                                                                              • API String ID: 3157425598-440645147
                                                                                                                                                                                                                              • Opcode ID: 8b1ea6b13d80497599b74a4f17c7f641e17d439436ac87c9fc46a30647371513
                                                                                                                                                                                                                              • Instruction ID: c4b4f5f378ebbb2f7e0ff073b5e7c11cace2c20860db1d85b968a5ce25548eb7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8b1ea6b13d80497599b74a4f17c7f641e17d439436ac87c9fc46a30647371513
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9151B563F2C64784FB11EB25EC80379A7A4AF45784FD480B9D90D866A6EF7DD442C310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                              • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                              • Opcode ID: 0ccf8903cf5fd9aeb41b039fa9f1cb800aac3f93f93f03788acfe0ad99044ca6
                                                                                                                                                                                                                              • Instruction ID: e42391c624c3729c3dd1988967b1b418893339b0cf7a935f12b4416430f9ee70
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0ccf8903cf5fd9aeb41b039fa9f1cb800aac3f93f93f03788acfe0ad99044ca6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B8F054A3F1964292FF446B51FC80B7593A4EF48781F8410B9E54F456E4DF2CE48AC720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AdjustPointer
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1740715915-0
                                                                                                                                                                                                                              • Opcode ID: 92d83d9b34f83b521a09ba5b49f4fa4ff0e4aabc531c5689a04bfc7cad77936e
                                                                                                                                                                                                                              • Instruction ID: 80ff2e613f4bed7ff7f05f115ffa07e3f8215613f71c2500c98665e0a8f572f8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 92d83d9b34f83b521a09ba5b49f4fa4ff0e4aabc531c5689a04bfc7cad77936e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 11B19323B2A64381FE65FB15D98467AE390AF44B84F8984B5DE6D8F785DF3CD4428320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _set_statfp
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1156100317-0
                                                                                                                                                                                                                              • Opcode ID: 2bc9a1a893ca783c65b1834ad9b2aafb0e365d30d060e1b3bfacd12602894cdc
                                                                                                                                                                                                                              • Instruction ID: 0d11f29cd7b9379a726264bf40ccf868012a716835e3291cc01ead6dbae53f91
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2bc9a1a893ca783c65b1834ad9b2aafb0e365d30d060e1b3bfacd12602894cdc
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 625109A3D0894645F662BA34DC40BFAD250BF61750F9486B4FF5E266D0DF3CA44B9610
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Setup$Class$InstallParams$CallDeviceInstaller$DetailDevice_Get_InfoList
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3081971210-0
                                                                                                                                                                                                                              • Opcode ID: 695bbc71baaaec773e58d73fb442ecad0b1640a0d8d46f012f6265395287b3fe
                                                                                                                                                                                                                              • Instruction ID: cfc1ee733f9bda04c09f6ede5eee94c548275a7005dc2b301f10ea226487f600
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 695bbc71baaaec773e58d73fb442ecad0b1640a0d8d46f012f6265395287b3fe
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3E3150B3B1C28586F720EB12E9053BAA6A0FF59FC8F404175DA894BB85CF7CD5068B11
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _set_statfp
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1156100317-0
                                                                                                                                                                                                                              • Opcode ID: e7b1107881e48292ca022c74fe2ec48e51bdb5760dfe1fdbb7d7208ffa06045a
                                                                                                                                                                                                                              • Instruction ID: 107ae6dace0972e3d63fccf36b3c1bdfda1a19e5c3f2472f02208c7934a62980
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e7b1107881e48292ca022c74fe2ec48e51bdb5760dfe1fdbb7d7208ffa06045a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB1154E3E18A1306FA543564EC46B75D180AF65378FD807B4F97E066D78F9CA8438229
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CallEncodePointerTranslator
                                                                                                                                                                                                                              • String ID: MOC$RCC
                                                                                                                                                                                                                              • API String ID: 3544855599-2084237596
                                                                                                                                                                                                                              • Opcode ID: f803d8c648c2122474ce86b0b39a3cc156ebe4fa619f756f266b7816edd56d32
                                                                                                                                                                                                                              • Instruction ID: fc6839d786fb23ff4dbbbe5123856d127a8b2ac7bdecbf177d22bc48d90cd596
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f803d8c648c2122474ce86b0b39a3cc156ebe4fa619f756f266b7816edd56d32
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4491B173B187828AFB10EB65EC402AEB7A0FB44788F504139EA4D97755DF38E191CB10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: ebf6addb0422a3df8c88c69004cf465780081765257e989b9b1ed44549212502
                                                                                                                                                                                                                              • Instruction ID: 1e7863f24f5854b6f6709ebdbf39da47a0305c550e3a4fa5bd1ee67dff800cc3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ebf6addb0422a3df8c88c69004cf465780081765257e989b9b1ed44549212502
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD8161F394824286F7A8AF35C844DB8B6A0EF15B44F9402B9DA89C62D5DF39E543C731
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: e60271a038c53331095bc1501989483a53fb311e552cdae94f782dd2e6294a65
                                                                                                                                                                                                                              • Instruction ID: 750131cee3c875baaf770b6e58f5767cddfd3f8ec7f92dfa5c0a02a09d9f8432
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e60271a038c53331095bc1501989483a53fb311e552cdae94f782dd2e6294a65
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D48151B380824285F764AF35C854E79F6A0EF05B84F9441B6CA89C62C5DF3AE887C765
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: 696b434c9b65d82e3cb3a69da655823cedb2bb2a6dca5773e12b0c135f28c375
                                                                                                                                                                                                                              • Instruction ID: 3a930dc21976ce79d1c9017fc5c087b690ea896c498818243309c8d11074ac0a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 696b434c9b65d82e3cb3a69da655823cedb2bb2a6dca5773e12b0c135f28c375
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 83818373A1C24386FB64AF25C854178BBA0EF05B59F9401B6CA8DC6299DF3DE481C725
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: 4b0bb82413f354565f6b76abb1ea6af1657192eeb5dcd769b60e7d6808cf1343
                                                                                                                                                                                                                              • Instruction ID: 06f1ad0a19d9187880b97890ca6384731b1f06a629a8c28297e3139586965221
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4b0bb82413f354565f6b76abb1ea6af1657192eeb5dcd769b60e7d6808cf1343
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B98131B384C2428AFBA4AE35D844E78BBA0EF59B44F9401B5CB49C62C5DF39E447C725
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: -$e+000$gfff
                                                                                                                                                                                                                              • API String ID: 3215553584-2620144452
                                                                                                                                                                                                                              • Opcode ID: 0074e114a49e6fc809f4dcc0a04a1e80794e2a9b4d8ec782b6f912fc4b48aee0
                                                                                                                                                                                                                              • Instruction ID: 39ca597acc931846632981a2c4056885061f3aa51532d0104bbf7befed6cc827
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0074e114a49e6fc809f4dcc0a04a1e80794e2a9b4d8ec782b6f912fc4b48aee0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B371C4A3B187C196F7209F25E94076AE791EB44BE0F889271DA9C87BD9DF2CD441C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: 26b87493f0452009ca218a176671395cca8a3695ea8e3c936177f10e7989a2f7
                                                                                                                                                                                                                              • Instruction ID: 38933933185b0ad1b7c50ba6b4d187cb9c117a32f622bcc7594e7ecaa420a257
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 26b87493f0452009ca218a176671395cca8a3695ea8e3c936177f10e7989a2f7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F1615473A2C25386F768AF38C85437CB7A0EF05B19F9411BAC64F862D9CF29D485D621
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: 48a48ff5bc0ae375988f414688e987a49450b8b663d7d16d07c4109e67f0f616
                                                                                                                                                                                                                              • Instruction ID: ca1dca65d3160b4b37824cb6849ee19e61a5703ad468ef8bbdf81a805179b398
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 48a48ff5bc0ae375988f414688e987a49450b8b663d7d16d07c4109e67f0f616
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AA617173A2D21386F765AE34C85437CB7E0EF15B18F9411B6DA4AC22D9CF29E481C620
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: $*
                                                                                                                                                                                                                              • API String ID: 3215553584-3982473090
                                                                                                                                                                                                                              • Opcode ID: f977a82e5c76788af1767a775f5033a8640c51099ef2c99c72258bbf43d06a9c
                                                                                                                                                                                                                              • Instruction ID: 42ef2489cbc6e84a52f4764ef53951fa3dba302f62365a82b5bf20f129179e3d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f977a82e5c76788af1767a775f5033a8640c51099ef2c99c72258bbf43d06a9c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB6180B390C6028AF765AE38C844F7CB7A0EF05B09F9411B5C64AC22D5DF3EE582C665
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CallEncodePointerTranslator
                                                                                                                                                                                                                              • String ID: MOC$RCC
                                                                                                                                                                                                                              • API String ID: 3544855599-2084237596
                                                                                                                                                                                                                              • Opcode ID: 1468b56452d10623d81cdb1e1ed026f28ff39d5af83e5faff62cb6f8af0a23b1
                                                                                                                                                                                                                              • Instruction ID: 6450c81dfbd85281cf88cbe4a31f4726dbaa32c59ff19bb3821eb1695a302c72
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1468b56452d10623d81cdb1e1ed026f28ff39d5af83e5faff62cb6f8af0a23b1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C514A33A28A4686FB10EF65D9803ADB7A0FB84B88F444265EF4D53B59DF78E055C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CreateDestructExceptionFrameInfoObject__except_validate_context_record
                                                                                                                                                                                                                              • String ID: csm
                                                                                                                                                                                                                              • API String ID: 146877497-1018135373
                                                                                                                                                                                                                              • Opcode ID: a3fecbfbc24f64bd75b4b319e201772004d7a2b71ee4399e5099f2da34a284b3
                                                                                                                                                                                                                              • Instruction ID: 34722bfc796799b11a2701599c5cb4552b5d132e1f243732846d9a1b1ef98e38
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a3fecbfbc24f64bd75b4b319e201772004d7a2b71ee4399e5099f2da34a284b3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A5516E73A1878286E660EB15E84036EF7A0FB88794F440675EB8D87B56DF38E490CB10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: QueryValue$ErrorLast
                                                                                                                                                                                                                              • String ID: LowerFilters
                                                                                                                                                                                                                              • API String ID: 181557691-1260524392
                                                                                                                                                                                                                              • Opcode ID: 7cfd38d4b9c6a9580be2e36a9189f51fd8cc7de6ed91d8435a286111ac9b45e5
                                                                                                                                                                                                                              • Instruction ID: 1c4a97608f90994b1b88bfd07cda1691e53de681b05d42cfd868e9d5ab460712
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7cfd38d4b9c6a9580be2e36a9189f51fd8cc7de6ed91d8435a286111ac9b45e5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9521A023B1CB4586FA10EB11E85026EE391EF99B98F840275EA4D83BD6EF3CE441C710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DetailDeviceDevice_Get_InfoListSetup
                                                                                                                                                                                                                              • String ID: %-60s: %s$%s
                                                                                                                                                                                                                              • API String ID: 3680031113-1339393084
                                                                                                                                                                                                                              • Opcode ID: a51e5089ce0a16c6d52d016b188cefe7c1f7e6d2c4a6f8978211d45e4c582602
                                                                                                                                                                                                                              • Instruction ID: 98746c05516f0f7dbf90fb2d6e2b4dd778a6226f884fb353fd11d40299557caa
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a51e5089ce0a16c6d52d016b188cefe7c1f7e6d2c4a6f8978211d45e4c582602
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D921C863B1C54292FB20EF15EC507BAA3A0EF94B88FC54071DA4D87A96DF2CD506C760
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DetailDeviceDevice_Get_InfoListSetup
                                                                                                                                                                                                                              • String ID: %-60s: %s$%s
                                                                                                                                                                                                                              • API String ID: 3680031113-1339393084
                                                                                                                                                                                                                              • Opcode ID: c99e091277bb5b53b775382925c4bb54c33a56cc676f35083c55ea4e68d6ed99
                                                                                                                                                                                                                              • Instruction ID: 7a1c714d7567d36c9a49f9fa400725a9e003038991b5aea4de2d3cf50e210ef8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c99e091277bb5b53b775382925c4bb54c33a56cc676f35083c55ea4e68d6ed99
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA218173B1CA8296FA20EF15E8507BAB360EFA8788F844175DB4D47A95DF2CD506C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Exception$DestructObject$Raise
                                                                                                                                                                                                                              • String ID: csm
                                                                                                                                                                                                                              • API String ID: 2826525264-1018135373
                                                                                                                                                                                                                              • Opcode ID: c65463ea9101793cc31d4246695a90cc3882a240b8c6c27d7b38a8955c006e5e
                                                                                                                                                                                                                              • Instruction ID: 128d353ccc0fc9798c8b0b4301f731183c831d4cdf6e870ec515f0d985b06df5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c65463ea9101793cc31d4246695a90cc3882a240b8c6c27d7b38a8955c006e5e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 68313A77B1824287F630EF11E84026EB760EF94B94F854675DA8A477A6CF3CE885CB10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Exception$DestructObject$Raise
                                                                                                                                                                                                                              • String ID: csm
                                                                                                                                                                                                                              • API String ID: 2826525264-1018135373
                                                                                                                                                                                                                              • Opcode ID: cc8eb6da96c197ed980eb35cf3cd2df0145045b221062dc3d4578f740a01ffa4
                                                                                                                                                                                                                              • Instruction ID: a8fc352593bc068a4bb32f04084bef2522746191c000c3863a637a0155772f74
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cc8eb6da96c197ed980eb35cf3cd2df0145045b221062dc3d4578f740a01ffa4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1C214B7761864286E730EF15E44026EB760FB88BA5F850261DE9D47795CF3CE886CB11
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19527
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA1954E
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: GetProcAddress.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA18300
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function$AddressProc
                                                                                                                                                                                                                              • String ID: GetProcessWindowStation$GetUserObjectInformationW
                                                                                                                                                                                                                              • API String ID: 1640347226-2732317663
                                                                                                                                                                                                                              • Opcode ID: 6f5883c30fa4d970a6b2ca5bc24385a593e52fa01d7559c029fb7798c3f6cd56
                                                                                                                                                                                                                              • Instruction ID: ccb338f09547b7eb871c7ff66fc6fea934d5cbbbcdcbf21ccd953964e83f629b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6f5883c30fa4d970a6b2ca5bc24385a593e52fa01d7559c029fb7798c3f6cd56
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 171151A3A1874692FA41EB14EC509B6A3A1AF49754FC8017AE94D077D4DF3CE44AC760
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function
                                                                                                                                                                                                                              • String ID: MessageBoxW$RoInitialize
                                                                                                                                                                                                                              • API String ID: 2742660187-1810702038
                                                                                                                                                                                                                              • Opcode ID: dd70e31a59fc5cbf4f5a0b82821224db7ed2afd1b9f1bcf175a30592a1cc4cdc
                                                                                                                                                                                                                              • Instruction ID: e1e45e4795bb3af27b238180f375d9897ccf4d8cb3cceb7b58a4825e846c2a64
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dd70e31a59fc5cbf4f5a0b82821224db7ed2afd1b9f1bcf175a30592a1cc4cdc
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 061151E7E0864696FA45AB51FC408B5A310EF487D0F880476EE1C0BBD5CF3CE5968720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function
                                                                                                                                                                                                                              • String ID: SetThreadStackGuarantee$SystemFunction036
                                                                                                                                                                                                                              • API String ID: 2742660187-2910880125
                                                                                                                                                                                                                              • Opcode ID: 82353169a2ab33f6a6eac203720c7793f9c27a950768576486ffb45298bb144f
                                                                                                                                                                                                                              • Instruction ID: dc6ddcf12fe39d8fffb36e59e73db73f182cb8ddd30d196082bf26ebe115285b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 82353169a2ab33f6a6eac203720c7793f9c27a950768576486ffb45298bb144f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E8012CD3E18646A2FB09AB91EC408B0A351EF48740FD80072EE1C0A7D1DF7CE996C320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA19468
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA1949A
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: GetProcAddress.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA18300
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function$AddressProc
                                                                                                                                                                                                                              • String ID: GetActiveWindow$GetLastActivePopup
                                                                                                                                                                                                                              • API String ID: 1640347226-3742175580
                                                                                                                                                                                                                              • Opcode ID: 96139b02f01ac1a12e8e8bbed336b4c2bf4c2c17f5e7323450708969746c16ee
                                                                                                                                                                                                                              • Instruction ID: 79d0726081a2e341c7c22870a8649aa2253b39ce2061b2c6673acabd8b14869f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 96139b02f01ac1a12e8e8bbed336b4c2bf4c2c17f5e7323450708969746c16ee
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 29F0B6D7E09746A1FA14EB91DC609B092A09F08351FC804B6D90E0A3E0DF2CA587C270
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA1924C
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA1926E
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA181A8: GetProcAddress.KERNEL32(?,?,00000006,00007FF70AA18A2A,?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85), ref: 00007FF70AA18300
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: try_get_function$AddressProc
                                                                                                                                                                                                                              • String ID: MessageBoxA$MessageBoxW
                                                                                                                                                                                                                              • API String ID: 1640347226-1053882329
                                                                                                                                                                                                                              • Opcode ID: d25e26e93fbc0f399955a4174ee145feb3741ebe1ff497b5d2ef8bac74c6ea03
                                                                                                                                                                                                                              • Instruction ID: 15a0b8e5b8ff15dbac707a5cd08bf2e5af1b36f319ea9d14ca0b732e3a93b3f7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d25e26e93fbc0f399955a4174ee145feb3741ebe1ff497b5d2ef8bac74c6ea03
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7DF0CDE3D0864BA5FA04EB60EC918B4A351AF54784FC45077E54C122E5DF7CE95BCBA0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FilePointer$ErrorLast
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 142388799-0
                                                                                                                                                                                                                              • Opcode ID: 62e83ff613cf7e0c6914a0449e0ad6475a81f3d2e6a598e7b544edde691620a4
                                                                                                                                                                                                                              • Instruction ID: e69a44c90d2d50f9704a1d2bee216ebffcadab04f6e7c14e950ac5ccbafe79cd
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 62e83ff613cf7e0c6914a0449e0ad6475a81f3d2e6a598e7b544edde691620a4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 882199A3A0CA4141FB60AB29EC44569F761AF44BE0F984771EA6D47BD4CF7CD4528710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Initialize__scrt_fastfail__scrt_initialize_default_local_stdio_options_invalid_parameter_noinfo_onexit_set_fmode
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2724578021-0
                                                                                                                                                                                                                              • Opcode ID: 59f558a869d8c5a2891d93cde5f61cf3a556da39cfb7dd89c65c92046b5ebcbe
                                                                                                                                                                                                                              • Instruction ID: 9041e99c2b1b6b28ffbf576d13451e0db63adf8c93c2bd7bbf629a443c874582
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 59f558a869d8c5a2891d93cde5f61cf3a556da39cfb7dd89c65c92046b5ebcbe
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 44119A56F2C24345FA54BBF4CC566B991919FB4308FC088F4E50DDA2C3EF6CA8428672
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: MachineNode_$Connect_Disconnect_Locate_Reenumerate_
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 218754429-0
                                                                                                                                                                                                                              • Opcode ID: 51e3b3903d85c558772266e626df222a9037cd96535ea5ab3710ae0d24f20ba0
                                                                                                                                                                                                                              • Instruction ID: c72e6920f4042534a69560616df78cfa6aa78a86f21695886d5887016d66865d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 51e3b3903d85c558772266e626df222a9037cd96535ea5ab3710ae0d24f20ba0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9411BB23B1C64243F714EF21E84056AE3A1FFD8B88F858171DA4D47655DF2DD5018610
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: HeapManager::getMemoryName::operator+=Name::operator=
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2929307750-0
                                                                                                                                                                                                                              • Opcode ID: fce481929f355538a9b42238b523bc7f3f2660cc8b7c85b8c5e9693f606264b3
                                                                                                                                                                                                                              • Instruction ID: 9f6d86062cbed0d1750e46d707dd092a2d9473c2fb05439a79b04634062e88e5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fce481929f355538a9b42238b523bc7f3f2660cc8b7c85b8c5e9693f606264b3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F411E763F2E69241FA11E751DC00179E391AF24BC5FD8C871D54C82A97DF2DE8528310
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FilePointer$ErrorLast
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 142388799-0
                                                                                                                                                                                                                              • Opcode ID: 5218c0f678f2c40fbbdda99fcc7e3f762700fa66660efab7cd38c83b84687fb8
                                                                                                                                                                                                                              • Instruction ID: 1a13e36eaace3665d2488044d4f09f22823387f0932a7a8292d27047565007f0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5218c0f678f2c40fbbdda99fcc7e3f762700fa66660efab7cd38c83b84687fb8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FD1191A3A0CA4182F720AB65FC0096AEB60BF88B94F904171EA9D43AD4CF3CD4528710
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: *
                                                                                                                                                                                                                              • API String ID: 3215553584-163128923
                                                                                                                                                                                                                              • Opcode ID: c702a447af3feb003120d3a589a2401bc16d95218c9ee08842c12031ba723851
                                                                                                                                                                                                                              • Instruction ID: ca539f9fac52d421642419a24c89274671e40ed9ab6446239e81a6815c0d1f2f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c702a447af3feb003120d3a589a2401bc16d95218c9ee08842c12031ba723851
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6A7194F390861286F768AF38D854E7CBAA0EF05B58F95017ACA4E922D4DF39D443C764
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: *
                                                                                                                                                                                                                              • API String ID: 3215553584-163128923
                                                                                                                                                                                                                              • Opcode ID: 273e77a1793748d35078b520fc40068adaf46b422db4c706b51f3ef3c241a5fe
                                                                                                                                                                                                                              • Instruction ID: 59af38bb5b3729055bb9b9910826e157ac1254a9b0c31d62d1d2756330458c91
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 273e77a1793748d35078b520fc40068adaf46b422db4c706b51f3ef3c241a5fe
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C71CAF390921286F7686F38C850E7DFBB1EF44B14F950179DA4A822D5DF69D482C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: *
                                                                                                                                                                                                                              • API String ID: 3215553584-163128923
                                                                                                                                                                                                                              • Opcode ID: 44c1df76ee1ff000bf001b99eeb66820c451a0d8bf2018bec658e7c217c0f5f6
                                                                                                                                                                                                                              • Instruction ID: 412fdc3f3376c0d87b468794014872670c663536b423a73f354621f4a36fdf06
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 44c1df76ee1ff000bf001b99eeb66820c451a0d8bf2018bec658e7c217c0f5f6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 157182F390861286F7A5AF39C884CBCB6A0EF09B48F941275CA4AC26D4DF29D443C765
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: *
                                                                                                                                                                                                                              • API String ID: 3215553584-163128923
                                                                                                                                                                                                                              • Opcode ID: 0377a43a123b46e862bf5f185707fa53883c6999a2b7e98940989a3650cad85b
                                                                                                                                                                                                                              • Instruction ID: 485913fa6a264684ddd8c3d2e3ab3009fc7c53138f28a0e1c60f10136280e257
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0377a43a123b46e862bf5f185707fa53883c6999a2b7e98940989a3650cad85b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3D7183B390821286F765AF38C844E7DBBA0EF06B58F954175CA89C22D9DF39D493C724
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF70AA10642
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA179F8: HeapFree.KERNEL32(?,?,?,00007FF70AA232DC,?,?,?,00007FF70AA236FF,?,?,00000000,00007FF70AA23F44,?,?,?,00007FF70AA23E77), ref: 00007FF70AA17A0E
                                                                                                                                                                                                                                • Part of subcall function 00007FF70AA179F8: GetLastError.KERNEL32(?,?,?,00007FF70AA232DC,?,?,?,00007FF70AA236FF,?,?,00000000,00007FF70AA23F44,?,?,?,00007FF70AA23E77), ref: 00007FF70AA17A20
                                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF70A9E7805), ref: 00007FF70AA10660
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe, xrefs: 00007FF70AA1064E
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                              • API String ID: 3580290477-2985852448
                                                                                                                                                                                                                              • Opcode ID: b063ccabdf4ae0fb810ec30d9af89ab26e9ed12f878b4f8ead2f3c050a887b6f
                                                                                                                                                                                                                              • Instruction ID: 7a3c18c4b51368127bf1f103e92511ef18320918addec69006cbe28aefd8a205
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b063ccabdf4ae0fb810ec30d9af89ab26e9ed12f878b4f8ead2f3c050a887b6f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BF419AB3A08B12AAF744AF21EC408B8B790AF847C0F940075E94E47BC5DF3DE4828720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe, xrefs: 00007FF70AA0FDBF
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: C:\Program Files\FastestVPN\Resources\driver\windows10\amd64\tapinstall.exe
                                                                                                                                                                                                                              • API String ID: 3215553584-2985852448
                                                                                                                                                                                                                              • Opcode ID: e29d975727e9928f6db482a1ce53242b1b870c676fb5658a615ffb6c2a7e9428
                                                                                                                                                                                                                              • Instruction ID: 24c3d134b08b664df115b4354d17e7b90fc5d97d00a598033c3e7a41a5d8d0c3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e29d975727e9928f6db482a1ce53242b1b870c676fb5658a615ffb6c2a7e9428
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6441AFB3A08B1289F760AF29EC408ACA794EF447D4F944072E94D97BD5DF7DE4828320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorFileLastWrite
                                                                                                                                                                                                                              • String ID: U
                                                                                                                                                                                                                              • API String ID: 442123175-4171548499
                                                                                                                                                                                                                              • Opcode ID: 1fe9f3420805e2f29ef7fd3f085adcd01cfbc63ee96cabacd67f80ead1b7df33
                                                                                                                                                                                                                              • Instruction ID: 678d2e39fd067967328e1fe5dff46a460cbffb35bd1221bf126abac660a66933
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1fe9f3420805e2f29ef7fd3f085adcd01cfbc63ee96cabacd67f80ead1b7df33
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7341D473B29B8282EB509F29E8447AAA760FB98784F804031EE4D977D8DF3CD552C750
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: (null)
                                                                                                                                                                                                                              • API String ID: 3215553584-3941151225
                                                                                                                                                                                                                              • Opcode ID: 6c3bdb81d6503200fbc9806bbd4de99d2cd9e2aec5a58b5ddbe94e3352eb6c76
                                                                                                                                                                                                                              • Instruction ID: 6bf4746f0192bdd6f5e5d06fc0ac26bc4a65ee2f32f0b89db1e17a69d1a5aeae
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c3bdb81d6503200fbc9806bbd4de99d2cd9e2aec5a58b5ddbe94e3352eb6c76
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E5419FF390864286FB54AF38C940ABCA7A0EF05B4CF944079C648873D5EB6AE463C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: (null)
                                                                                                                                                                                                                              • API String ID: 3215553584-3941151225
                                                                                                                                                                                                                              • Opcode ID: 86f5d118cb039ec818438e09ce49581f3b3a508989dcbeb2b4f251bb552b9fde
                                                                                                                                                                                                                              • Instruction ID: 1c47929305b8be3a48016dafe955bef9b6fd5abfaed1e3c4898cc9f2e4fcf986
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 86f5d118cb039ec818438e09ce49581f3b3a508989dcbeb2b4f251bb552b9fde
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 92414DB3D086428AFB546F28C944A7CE7A0EF19B4CF944079C648872D5DBAAD467DB20
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: (null)
                                                                                                                                                                                                                              • API String ID: 3215553584-3941151225
                                                                                                                                                                                                                              • Opcode ID: cc2c6a8b0e55809a46d0f9a000170ec88b53eaf67deeeed0a9ebb9cf96cbfb4a
                                                                                                                                                                                                                              • Instruction ID: 4a3b9976c19d625692091bf0add3f7f94a9e80a189d8f31d719c5997b6a10002
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cc2c6a8b0e55809a46d0f9a000170ec88b53eaf67deeeed0a9ebb9cf96cbfb4a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 25318CB390864286FB54AF25D940ABCA7A0EF05B88F944079CA8C477D5DF7EE466C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _invalid_parameter_noinfo
                                                                                                                                                                                                                              • String ID: (null)
                                                                                                                                                                                                                              • API String ID: 3215553584-3941151225
                                                                                                                                                                                                                              • Opcode ID: 8d16575f416e964c397b675debac7c57f087c1fd9fd9ac565c228dc38de02ea8
                                                                                                                                                                                                                              • Instruction ID: 1414f2dab9978a07e45e26c0fa60d9b9d0103638c0e1d614f8b2c6f8b8ab3834
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8d16575f416e964c397b675debac7c57f087c1fd9fd9ac565c228dc38de02ea8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 58316BB390865186FB54AF25D940A7CABA1EF14B48F9440BACB4C473D5DFBAE463C720
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: EntryInterlockedListNamePush__un
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 524438517-3916222277
                                                                                                                                                                                                                              • Opcode ID: 417fdae7254f6f5144bd35c4e94cf888892e231184d73a789330c72b6a667246
                                                                                                                                                                                                                              • Instruction ID: 18ec29e2732764835474cb0796e1e348ff043c10951544ef92b324d9d38b6cad
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 417fdae7254f6f5144bd35c4e94cf888892e231184d73a789330c72b6a667246
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8C31F553B29B9250FE45EB2ADC044A9E3A0BF58BE8F984671DD2D43381EF39D402C360
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: _set_errno_from_matherr
                                                                                                                                                                                                                              • String ID: exp
                                                                                                                                                                                                                              • API String ID: 1187470696-113136155
                                                                                                                                                                                                                              • Opcode ID: d5f934b609bcad54c18539aeaafe18b7f7d4df74e02c91daf66fb3b3797701d8
                                                                                                                                                                                                                              • Instruction ID: dd084f42ffc388dc9f604802e12636695dbbb65ec04c32a05222070b2395ffad
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d5f934b609bcad54c18539aeaafe18b7f7d4df74e02c91daf66fb3b3797701d8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D6212FB7E196418BE760DF28E840AAAF2A0FFA9700F905535F68D82795DF3CE4058F10
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Stringtry_get_function
                                                                                                                                                                                                                              • String ID: LCMapStringEx
                                                                                                                                                                                                                              • API String ID: 2588686239-3893581201
                                                                                                                                                                                                                              • Opcode ID: cb295809db890668f8262a5fe3d3b6ddd0daf1558d4252fdccb92730558150a5
                                                                                                                                                                                                                              • Instruction ID: 83267fae7ca098e4c88bb2e332333022af59f9b15ed0808a3c40c9707fcda91d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cb295809db890668f8262a5fe3d3b6ddd0daf1558d4252fdccb92730558150a5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8E111872A08B8186E660DB05F8406AAB7A1FBC9B90F944136EE8D83B59CF3CD4518B40
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CompareStringtry_get_function
                                                                                                                                                                                                                              • String ID: CompareStringEx
                                                                                                                                                                                                                              • API String ID: 3328479835-2590796910
                                                                                                                                                                                                                              • Opcode ID: b4cbd51ef5490bc2d2e272553a4ec6addf4d60e5b84b1302dc18e736ddf69fb6
                                                                                                                                                                                                                              • Instruction ID: d8b27b45cac24908e9f735f979514a89959c6f4723443fd3f1d58af97ab6d861
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b4cbd51ef5490bc2d2e272553a4ec6addf4d60e5b84b1302dc18e736ddf69fb6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C7112977A08B8186E760DF15F8406AAB7A0FB8CB90F944136EE8D43B59CF3CD4418B40
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DateFormattry_get_function
                                                                                                                                                                                                                              • String ID: GetDateFormatEx
                                                                                                                                                                                                                              • API String ID: 595753042-159735388
                                                                                                                                                                                                                              • Opcode ID: 10ba63a0d18b04a583d40d43b30d9b9fca51ff14bda4a48675f954ae51532e04
                                                                                                                                                                                                                              • Instruction ID: ea63c67705d7be4c191010236721f8690a489c96e965c1cf7177249e6b74fc11
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 10ba63a0d18b04a583d40d43b30d9b9fca51ff14bda4a48675f954ae51532e04
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 39113AA2A08B8186E610DF55F84059AB7A0FB89BD0F584136FE8D43BA8CF3CD5418B40
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: FormatTimetry_get_function
                                                                                                                                                                                                                              • String ID: GetTimeFormatEx
                                                                                                                                                                                                                              • API String ID: 3261793192-1692793031
                                                                                                                                                                                                                              • Opcode ID: aeeeb5d1137ef8777056a49e071640647c3087b2b7666cf388f882a4f27613d1
                                                                                                                                                                                                                              • Instruction ID: fdcbcc91dd8a1fc9f8f3f5297c3c7ca03b36494dbc766e5bac19cb50a1c27b1f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aeeeb5d1137ef8777056a49e071640647c3087b2b7666cf388f882a4f27613d1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB1130A7A0878186E611DB56E80045AB7A0FF8CBD0F584175FE8D43BA9CF3CD5568B50
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: DefaultUsertry_get_function
                                                                                                                                                                                                                              • String ID: GetUserDefaultLocaleName
                                                                                                                                                                                                                              • API String ID: 3217810228-151340334
                                                                                                                                                                                                                              • Opcode ID: 40f2b170c37b226c28a728e1fb59e4eb6a38f080f95f7a64a26471c64eab7d17
                                                                                                                                                                                                                              • Instruction ID: 98c35a4afc60d0fd2ed7bde96de2e3160a8041f29f325b1938484b5c0df2daf2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 40f2b170c37b226c28a728e1fb59e4eb6a38f080f95f7a64a26471c64eab7d17
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7AF054D3F1854292FB15A755ED80DB5A2616F4C780FC44075E90D067D5CF2CD8478320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                                                                                                                                                                              • String ID: InitializeCriticalSectionEx
                                                                                                                                                                                                                              • API String ID: 539475747-3084827643
                                                                                                                                                                                                                              • Opcode ID: 036a1433a8a1f8b3f241dbe4fb9b563d765e8a3562a01f57a6fbde3195910b39
                                                                                                                                                                                                                              • Instruction ID: 5bfaba655362ca0b8e81d7a67cafc067faaccf28a1a299e012a917791a943fae
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 036a1433a8a1f8b3f241dbe4fb9b563d765e8a3562a01f57a6fbde3195910b39
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C4F054A7E1874192FA05BB51FD408A9A261BF4CB80FC840B6E91D13BD5CF3CD4568760
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF70A9E8A7D
                                                                                                                                                                                                                              • _CxxThrowException.LIBVCRUNTIME ref: 00007FF70A9E8A8E
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E95E8: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF70A9E8A93), ref: 00007FF70A9E965D
                                                                                                                                                                                                                                • Part of subcall function 00007FF70A9E95E8: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF70A9E8A93), ref: 00007FF70A9E968F
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Exception$FileHeaderRaiseThrowstd::bad_alloc::bad_alloc
                                                                                                                                                                                                                              • String ID: Unknown exception
                                                                                                                                                                                                                              • API String ID: 3561508498-410509341
                                                                                                                                                                                                                              • Opcode ID: c34982857cb7bf4f7b9c185461aa535e310ed63d4d8e15e87b28d440cdfdae32
                                                                                                                                                                                                                              • Instruction ID: 89e5904bae8aba284b576f7ba01df5c0c038c0190a7b1967bf5d55da93ba5e63
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c34982857cb7bf4f7b9c185461aa535e310ed63d4d8e15e87b28d440cdfdae32
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 22D01263A1858692FE10FB40DC40794A330FFD4308FE04472E14C815B1DF6CD946C750
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70AA18A25
                                                                                                                                                                                                                              • TlsSetValue.KERNEL32(?,?,00000000,00007FF70AA177AE,?,?,00000000,00007FF70AA16B85,?,?,?,?,00007FF70A9F6CA8), ref: 00007FF70AA18A3C
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Valuetry_get_function
                                                                                                                                                                                                                              • String ID: FlsSetValue
                                                                                                                                                                                                                              • API String ID: 738293619-3750699315
                                                                                                                                                                                                                              • Opcode ID: f6d5dd2663f4e630c5fdec50bbb7cd7a8c87450e82d038accba4aa9b3675ea98
                                                                                                                                                                                                                              • Instruction ID: 93fb054dfa85bd6fa3c6255c0b3af59079fe66d2dfc59d58fb354606186a193d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f6d5dd2663f4e630c5fdec50bbb7cd7a8c87450e82d038accba4aa9b3675ea98
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9EE0E5E7E1864693FA046B51FC408B9E221AF8C781FD951B6E91E063D5CF3CD8968320
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • try_get_function.LIBVCRUNTIME ref: 00007FF70A9EA56D
                                                                                                                                                                                                                              • TlsSetValue.KERNEL32(?,?,?,00007FF70A9E9CC5,?,?,?,?,00007FF70A9E91A4,?,?,?,?,00007FF70A9E814B), ref: 00007FF70A9EA584
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000000A.00000002.2345199746.00007FF70A9E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70A9E0000, based on PE: true
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345173222.00007FF70A9E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345236578.00007FF70AA34000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345264921.00007FF70AA47000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 0000000A.00000002.2345286816.00007FF70AA4A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_10_2_7ff70a9e0000_tapinstall.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Valuetry_get_function
                                                                                                                                                                                                                              • String ID: FlsSetValue
                                                                                                                                                                                                                              • API String ID: 738293619-3750699315
                                                                                                                                                                                                                              • Opcode ID: 620ae2d36bd9a72b075ae6d885032ef81b4224fd675c2c0689d5fc8c746a91d4
                                                                                                                                                                                                                              • Instruction ID: 28e0831541fc5d9f0361a77179e2c2084921e31fad00dc4494a592ffe4ec5ebb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 620ae2d36bd9a72b075ae6d885032ef81b4224fd675c2c0689d5fc8c746a91d4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00E030E7E1C64293FA04AB50FC008BCE321AF8C791FDA40B2E91D466A5CF3CD8568320

                                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                                              Execution Coverage:1.2%
                                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                              Signature Coverage:2.9%
                                                                                                                                                                                                                              Total number of Nodes:2000
                                                                                                                                                                                                                              Total number of Limit Nodes:28
                                                                                                                                                                                                                              execution_graph 15570 100134a0 15582 10013240 15570->15582 15572 100134b2 OpenSCManagerA 15573 100134ca OpenServiceA 15572->15573 15574 1001350f GetLastError 15572->15574 15575 100134dd DeleteService GetLastError CloseServiceHandle CloseServiceHandle 15573->15575 15576 100134fe GetLastError CloseServiceHandle 15573->15576 15577 10013517 SetLastError 15574->15577 15575->15577 15576->15577 15612 10012d70 RegOpenKeyExA 15577->15612 15579 10013525 15617 10012d00 RegOpenKeyExA 15579->15617 15581 1001352c 15620 10012f40 15582->15620 15584 10013266 15610 1001348c 15584->15610 15632 10012e20 RegOpenKeyExA 15584->15632 15586 10013281 15589 1001329f 15586->15589 15590 1001330e 15586->15590 15586->15610 15587 100132bc 15587->15610 15652 10007b2f 15587->15652 15588 10013341 15592 10012f40 107 API calls 15588->15592 15589->15587 15648 10008360 15589->15648 15590->15588 15591 10012f40 107 API calls 15590->15591 15591->15588 15594 1001336f 15592->15594 15597 10012f40 107 API calls 15594->15597 15602 10013386 15594->15602 15595 10013303 15595->15572 15597->15602 15599 10012e20 75 API calls 15599->15587 15600 100133f5 15604 10008360 ___sbh_free_block __VEC_memcpy 15600->15604 15611 100133ea 15600->15611 15601 1001342b RegOpenKeyExA 15603 10013482 15601->15603 15605 10013448 RegSetValueExA RegCloseKey 15601->15605 15602->15600 15606 100133b9 15602->15606 15607 10007b2f __mtdeletelocks 67 API calls 15603->15607 15603->15610 15604->15611 15605->15603 15606->15601 15606->15603 15608 10008360 ___sbh_free_block __VEC_memcpy 15606->15608 15607->15610 15608->15611 15610->15572 15611->15601 15613 10012d90 15612->15613 15614 10012d96 RegQueryValueExA 15612->15614 15613->15579 15615 10012dc3 RegSetValueExA RegCloseKey 15614->15615 15615->15579 15618 10012d25 RegSetValueExA RegCloseKey 15617->15618 15619 10012d1f 15617->15619 15618->15581 15619->15581 15665 10008877 15620->15665 15623 10012f93 15680 10007ccf 15623->15680 15624 10012fab 15626 10012fb5 RegQueryValueExA 15624->15626 15627 10012fdc RegSetValueExA 15624->15627 15629 10012ff3 RegCloseKey 15626->15629 15627->15629 15628 10012fa4 15628->15584 15630 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 15629->15630 15631 10013016 15630->15631 15631->15584 15633 10012e43 15632->15633 15634 10012e4a 15632->15634 15633->15586 15635 10012e56 RegQueryValueExA 15634->15635 15636 10012eef RegSetValueExA 15634->15636 15637 10012e76 RegCloseKey 15635->15637 15638 10012e89 15635->15638 15642 10012f20 RegCloseKey 15636->15642 15637->15586 16393 10007c0c 15638->16393 15641 10012e94 15643 10012eb0 RegQueryValueExA 15641->15643 15644 10012e9d RegCloseKey 15641->15644 15642->15586 15643->15642 15645 10012ecb RegCloseKey 15643->15645 15644->15586 15646 10007b2f __mtdeletelocks 67 API calls 15645->15646 15647 10012ede 15646->15647 15647->15586 15649 10008378 15648->15649 15650 1000839f __VEC_memcpy 15649->15650 15651 100083a7 15649->15651 15650->15651 15651->15599 15653 10007b3b __close 15652->15653 15654 10007b7a 15653->15654 15655 10007bb4 __close _realloc 15653->15655 15657 10009513 __lock 65 API calls 15653->15657 15654->15655 15656 10007b8f HeapFree 15654->15656 15655->15595 15656->15655 15658 10007ba1 15656->15658 15660 10007b52 ___sbh_find_block 15657->15660 15659 10009230 __flswbuf 65 API calls 15658->15659 15661 10007ba6 GetLastError 15659->15661 15662 10007b6c 15660->15662 16423 100095b7 15660->16423 15661->15655 16430 10007b85 15662->16430 15666 100088a2 15665->15666 15667 10008885 15665->15667 15669 100088ce 15666->15669 15671 100088b1 15666->15671 15688 10009230 15667->15688 15694 1000bd21 15669->15694 15674 10009230 __flswbuf 67 API calls 15671->15674 15675 100088b6 15674->15675 15678 100082eb __close 67 API calls 15675->15678 15676 100088fc 15677 1000889a RegOpenKeyExA 15676->15677 15738 1000ba9e 15676->15738 15677->15623 15677->15624 15678->15677 15681 10007cd7 15680->15681 15682 10007cd9 IsDebuggerPresent 15680->15682 15681->15628 16392 1000b918 15682->16392 15685 1000a802 SetUnhandledExceptionFilter UnhandledExceptionFilter 15686 1000a827 GetCurrentProcess TerminateProcess 15685->15686 15687 1000a81f __invoke_watson 15685->15687 15686->15628 15687->15686 15759 1000aaf7 GetLastError 15688->15759 15690 1000888a 15691 100082eb 15690->15691 15692 1000a91e __amsg_exit 67 API calls 15691->15692 15693 100082f9 __invoke_watson 15692->15693 15980 1000bbfe 15694->15980 15697 1000bd81 15698 10009230 __flswbuf 67 API calls 15697->15698 15727 1000bd86 15698->15727 15699 1000be42 15699->15697 15715 1000be67 __output_l __aulldvrm _strlen 15699->15715 15701 1000bdc1 15703 1000bdef 15701->15703 15705 100106d0 __flswbuf 67 API calls 15701->15705 15702 100082eb __close 67 API calls 15704 1000bd96 15702->15704 15703->15697 15708 100106d0 __flswbuf 67 API calls 15703->15708 15706 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 15704->15706 15707 1000bdcf 15705->15707 15709 1000c68d 15706->15709 15707->15703 15711 100106d0 __flswbuf 67 API calls 15707->15711 15710 1000be14 15708->15710 15709->15676 15710->15699 15716 100106d0 __flswbuf 67 API calls 15710->15716 15712 1000bddd 15711->15712 15714 100106d0 __flswbuf 67 API calls 15712->15714 15714->15703 15715->15704 15718 1000bc80 101 API calls _write_multi_char 15715->15718 15720 1000c656 15715->15720 15723 10007b2f __mtdeletelocks 67 API calls 15715->15723 15726 1000bcb3 101 API calls _write_multi_char 15715->15726 15729 1000c0d7 15715->15729 15730 10010872 79 API calls _wctomb_s 15715->15730 15737 1000bcd7 101 API calls _write_string 15715->15737 15995 1001088d 15715->15995 15717 1000be22 15716->15717 15717->15699 15719 100106d0 __flswbuf 67 API calls 15717->15719 15718->15715 15721 1000be30 15719->15721 15725 10009230 __flswbuf 67 API calls 15720->15725 15724 100106d0 __flswbuf 67 API calls 15721->15724 15722 1000c0ff 15728 1000a91e __amsg_exit 67 API calls 15722->15728 15723->15715 15724->15699 15725->15727 15726->15715 15727->15702 15733 1000c346 15728->15733 15729->15722 15731 1000b155 __malloc_crt 67 API calls 15729->15731 15730->15715 15731->15722 15732 1000c36c 15734 1000c38b 15732->15734 15736 1000a91e __amsg_exit 67 API calls 15732->15736 15733->15732 15735 1000a91e __amsg_exit 67 API calls 15733->15735 15734->15676 15735->15732 15736->15734 15737->15715 15739 100106d0 __flswbuf 67 API calls 15738->15739 15740 1000baac 15739->15740 15741 1000bab7 15740->15741 15742 1000bace 15740->15742 15743 10009230 __flswbuf 67 API calls 15741->15743 15744 1000bad2 15742->15744 15752 1000badf __flswbuf 15742->15752 15746 1000babc 15743->15746 15745 10009230 __flswbuf 67 API calls 15744->15745 15745->15746 15746->15677 15747 1000bbcd 15749 100103b1 __locking 101 API calls 15747->15749 15748 1000bb4d 15750 1000bb64 15748->15750 15754 1000bb81 15748->15754 15749->15746 16219 100103b1 15750->16219 15752->15746 15755 1000bb34 15752->15755 15758 1000bb3f 15752->15758 16206 100104d1 15752->16206 15754->15746 16244 1000fc76 15754->16244 15755->15758 16216 1001048d 15755->16216 15758->15747 15758->15748 15773 1000a9b0 TlsGetValue 15759->15773 15762 1000ab62 SetLastError 15762->15690 15767 1000ab41 15793 1000aa38 15767->15793 15768 1000ab59 15770 10007b2f __mtdeletelocks 64 API calls 15768->15770 15772 1000ab5f 15770->15772 15771 1000ab49 GetCurrentThreadId 15771->15762 15772->15762 15774 1000a9c3 15773->15774 15775 1000a9de 15773->15775 15776 1000a91e __amsg_exit 65 API calls 15774->15776 15775->15762 15778 1000b195 15775->15778 15777 1000a9ce TlsSetValue 15776->15777 15777->15775 15780 1000b199 15778->15780 15781 1000ab20 15780->15781 15782 1000b1b9 Sleep 15780->15782 15807 1000f6fc 15780->15807 15781->15762 15783 1000a91e TlsGetValue 15781->15783 15782->15780 15784 1000a931 15783->15784 15785 1000a952 GetModuleHandleA 15783->15785 15784->15785 15788 1000a93b TlsGetValue 15784->15788 15786 1000a963 15785->15786 15787 1000a94a 15785->15787 15951 1000a83b 15786->15951 15787->15767 15787->15768 15791 1000a946 15788->15791 15790 1000a968 15790->15787 15792 1000a96c GetProcAddress 15790->15792 15791->15785 15791->15787 15792->15787 15963 1000a044 15793->15963 15795 1000aa44 GetModuleHandleA 15796 1000aa95 InterlockedIncrement 15795->15796 15797 1000aa66 15795->15797 15798 10009513 __lock 63 API calls 15796->15798 15799 1000a83b __amsg_exit 63 API calls 15797->15799 15802 1000aabc 15798->15802 15800 1000aa6b 15799->15800 15800->15796 15801 1000aa6f GetProcAddress GetProcAddress 15800->15801 15801->15796 15964 1000ee79 InterlockedIncrement 15802->15964 15804 1000aadb 15976 1000aaee 15804->15976 15806 1000aae8 __close 15806->15771 15808 1000f708 __close 15807->15808 15809 1000f720 15808->15809 15819 1000f73f _memset 15808->15819 15810 10009230 __flswbuf 66 API calls 15809->15810 15811 1000f725 15810->15811 15812 100082eb __close 66 API calls 15811->15812 15816 1000f735 __close 15812->15816 15813 1000f7b1 HeapAlloc 15813->15819 15816->15780 15819->15813 15819->15816 15820 10009513 15819->15820 15827 10009d60 15819->15827 15833 1000f7f8 15819->15833 15836 1000a715 15819->15836 15821 10009526 15820->15821 15822 10009539 EnterCriticalSection 15820->15822 15839 10009450 15821->15839 15822->15819 15824 1000952c 15824->15822 15865 1000a236 15824->15865 15829 10009d8c 15827->15829 15828 10009e25 15832 10009e2e 15828->15832 15946 1000997b 15828->15946 15829->15828 15829->15832 15939 100098cb 15829->15939 15832->15819 15950 1000943b LeaveCriticalSection 15833->15950 15835 1000f7ff 15835->15819 15837 1000a91e __amsg_exit 67 API calls 15836->15837 15838 1000a720 15837->15838 15838->15819 15840 1000945c __close 15839->15840 15841 10009482 15840->15841 15872 1000a6d2 15840->15872 15849 10009492 __close 15841->15849 15918 1000b155 15841->15918 15847 100094b3 15852 10009513 __lock 67 API calls 15847->15852 15848 100094a4 15851 10009230 __flswbuf 67 API calls 15848->15851 15849->15824 15851->15849 15854 100094ba 15852->15854 15855 100094c2 15854->15855 15856 100094ee 15854->15856 15923 1000e5c6 15855->15923 15857 10007b2f __mtdeletelocks 67 API calls 15856->15857 15859 100094df 15857->15859 15936 1000950a 15859->15936 15860 100094cd 15860->15859 15862 10007b2f __mtdeletelocks 67 API calls 15860->15862 15863 100094d9 15862->15863 15864 10009230 __flswbuf 67 API calls 15863->15864 15864->15859 15866 1000a6d2 __FF_MSGBANNER 67 API calls 15865->15866 15867 1000a23b 15866->15867 15868 1000a532 __amsg_exit 67 API calls 15867->15868 15869 1000a244 15868->15869 15870 1000a91e __amsg_exit 67 API calls 15869->15870 15871 10009538 15870->15871 15871->15822 15873 1000ecf3 __FF_MSGBANNER 67 API calls 15872->15873 15874 1000a6d9 15873->15874 15875 1000ecf3 __FF_MSGBANNER 67 API calls 15874->15875 15877 1000a6e6 15874->15877 15875->15877 15876 1000a532 __amsg_exit 67 API calls 15878 1000a6fe 15876->15878 15877->15876 15879 10009471 15877->15879 15880 1000a532 __amsg_exit 67 API calls 15878->15880 15881 1000a532 15879->15881 15880->15879 15882 1000a53e 15881->15882 15883 1000ecf3 __FF_MSGBANNER 64 API calls 15882->15883 15913 10009478 15882->15913 15884 1000a55e 15883->15884 15885 1000a699 GetStdHandle 15884->15885 15887 1000ecf3 __FF_MSGBANNER 64 API calls 15884->15887 15886 1000a6a7 _strlen 15885->15886 15885->15913 15890 1000a6c1 WriteFile 15886->15890 15886->15913 15888 1000a56f 15887->15888 15888->15885 15889 1000a581 15888->15889 15891 1000b7b8 _strcpy_s 64 API calls 15889->15891 15889->15913 15890->15913 15892 1000a5a3 15891->15892 15893 1000a5b7 GetModuleFileNameA 15892->15893 15895 100081ef __invoke_watson 10 API calls 15892->15895 15894 1000a5d5 15893->15894 15900 1000a5f8 _strlen 15893->15900 15896 1000b7b8 _strcpy_s 64 API calls 15894->15896 15897 1000a5b4 15895->15897 15898 1000a5e5 15896->15898 15897->15893 15898->15900 15901 100081ef __invoke_watson 10 API calls 15898->15901 15899 1000a63b 15902 1000ebcf _strcat_s 64 API calls 15899->15902 15900->15899 15904 1000ec40 __crtLCMapStringW_stat 64 API calls 15900->15904 15901->15900 15903 1000a64e 15902->15903 15905 1000a65f 15903->15905 15907 100081ef __invoke_watson 10 API calls 15903->15907 15906 1000a628 15904->15906 15908 1000ebcf _strcat_s 64 API calls 15905->15908 15906->15899 15909 100081ef __invoke_watson 10 API calls 15906->15909 15907->15905 15910 1000a670 15908->15910 15909->15899 15911 100081ef __invoke_watson 10 API calls 15910->15911 15914 1000a681 15910->15914 15911->15914 15912 1000ea12 __amsg_exit 64 API calls 15912->15913 15915 1000a280 15913->15915 15914->15912 15916 1000a25a ___crtCorExitProcess GetModuleHandleA GetProcAddress 15915->15916 15917 1000a289 ExitProcess 15916->15917 15922 1000b159 15918->15922 15919 10007c0c _malloc 66 API calls 15919->15922 15920 1000949d 15920->15847 15920->15848 15921 1000b171 Sleep 15921->15922 15922->15919 15922->15920 15922->15921 15924 1000e5d2 __close 15923->15924 15925 1000a91e __amsg_exit 65 API calls 15924->15925 15926 1000e5e2 15925->15926 15927 1000a2df ___crtInitCritSecAndSpinCount 65 API calls 15926->15927 15933 1000e636 __close 15926->15933 15928 1000e5f2 15927->15928 15929 1000e601 15928->15929 15930 100081ef __invoke_watson 10 API calls 15928->15930 15931 1000e60a GetModuleHandleA 15929->15931 15932 1000e62b 15929->15932 15930->15929 15931->15932 15934 1000e619 GetProcAddress 15931->15934 15935 1000a8a7 ___crtInitCritSecAndSpinCount 65 API calls 15932->15935 15933->15860 15934->15932 15935->15933 15937 1000943b __fcloseall LeaveCriticalSection 15936->15937 15938 10009511 15937->15938 15938->15849 15940 10009912 HeapAlloc 15939->15940 15941 100098de HeapReAlloc 15939->15941 15943 100098fc 15940->15943 15944 10009935 VirtualAlloc 15940->15944 15942 10009900 15941->15942 15941->15943 15942->15940 15943->15828 15944->15943 15945 1000994f HeapFree 15944->15945 15945->15943 15947 10009990 VirtualAlloc 15946->15947 15949 100099d7 15947->15949 15949->15832 15950->15835 15956 1000a316 15951->15956 15953 1000a856 15954 1000a861 GetModuleHandleA 15953->15954 15955 1000a85d ___TypeMatch 15953->15955 15954->15955 15955->15790 15957 1000a321 15956->15957 15958 10009230 __flswbuf 67 API calls 15957->15958 15959 1000a346 15957->15959 15960 1000a326 15958->15960 15959->15953 15961 100082eb __close 67 API calls 15960->15961 15962 1000a336 15961->15962 15962->15953 15963->15795 15965 1000ee94 InterlockedIncrement 15964->15965 15966 1000ee97 15964->15966 15965->15966 15967 1000eea1 InterlockedIncrement 15966->15967 15968 1000eea4 15966->15968 15967->15968 15969 1000eeb1 15968->15969 15970 1000eeae InterlockedIncrement 15968->15970 15971 1000eebb InterlockedIncrement 15969->15971 15972 1000eebe 15969->15972 15970->15969 15971->15972 15973 1000eed3 InterlockedIncrement 15972->15973 15974 1000eee3 InterlockedIncrement 15972->15974 15975 1000eeec InterlockedIncrement 15972->15975 15973->15972 15974->15972 15975->15804 15979 1000943b LeaveCriticalSection 15976->15979 15978 1000aaf5 15978->15806 15979->15978 15981 1000bc0d 15980->15981 15985 1000bc5a 15980->15985 15998 1000ab6e 15981->15998 15984 1000bc3a 15984->15985 16018 1000f24d 15984->16018 15985->15697 15985->15699 15988 100106d0 15985->15988 15989 100106f8 15988->15989 15990 100106db 15988->15990 15989->15701 15991 10009230 __flswbuf 67 API calls 15990->15991 15992 100106e0 15991->15992 15993 100082eb __close 67 API calls 15992->15993 15994 100106f0 15993->15994 15994->15701 15996 1000bbfe _LocaleUpdate::_LocaleUpdate 77 API calls 15995->15996 15997 1001089e 15996->15997 15997->15715 15999 1000aaf7 _raise 67 API calls 15998->15999 16000 1000ab74 15999->16000 16001 1000ab81 16000->16001 16002 1000a236 __amsg_exit 67 API calls 16000->16002 16001->15984 16003 1000efc9 16001->16003 16002->16001 16004 1000efd5 __close 16003->16004 16005 1000ab6e _LocaleUpdate::_LocaleUpdate 67 API calls 16004->16005 16006 1000efda 16005->16006 16007 1000f008 16006->16007 16008 1000efec 16006->16008 16009 10009513 __lock 67 API calls 16007->16009 16010 1000ab6e _LocaleUpdate::_LocaleUpdate 67 API calls 16008->16010 16011 1000f00f 16009->16011 16012 1000eff1 16010->16012 16034 1000ef8b 16011->16034 16016 1000a236 __amsg_exit 67 API calls 16012->16016 16017 1000efff __close 16012->16017 16016->16017 16017->15984 16019 1000f259 __close 16018->16019 16020 1000ab6e _LocaleUpdate::_LocaleUpdate 67 API calls 16019->16020 16021 1000f25e 16020->16021 16022 10009513 __lock 67 API calls 16021->16022 16029 1000f270 16021->16029 16023 1000f28e 16022->16023 16024 1000f2d7 16023->16024 16025 1000f2a5 InterlockedDecrement 16023->16025 16026 1000f2bf InterlockedIncrement 16023->16026 16202 1000f2e8 16024->16202 16025->16026 16031 1000f2b0 16025->16031 16026->16024 16028 1000a236 __amsg_exit 67 API calls 16030 1000f27e __close 16028->16030 16029->16028 16029->16030 16030->15985 16031->16026 16032 10007b2f __mtdeletelocks 67 API calls 16031->16032 16033 1000f2be 16032->16033 16033->16026 16035 1000ef8f 16034->16035 16041 1000efc1 16034->16041 16036 1000ee79 ___addlocaleref 8 API calls 16035->16036 16035->16041 16037 1000efa2 16036->16037 16037->16041 16045 1000eeff 16037->16045 16042 1000f033 16041->16042 16201 1000943b LeaveCriticalSection 16042->16201 16044 1000f03a 16044->16012 16046 1000ef87 16045->16046 16047 1000ef08 InterlockedDecrement 16045->16047 16046->16041 16059 1000ed39 16046->16059 16048 1000ef21 16047->16048 16049 1000ef1e InterlockedDecrement 16047->16049 16050 1000ef2b InterlockedDecrement 16048->16050 16051 1000ef2e 16048->16051 16049->16048 16050->16051 16052 1000ef38 InterlockedDecrement 16051->16052 16053 1000ef3b 16051->16053 16052->16053 16054 1000ef45 InterlockedDecrement 16053->16054 16056 1000ef48 16053->16056 16054->16056 16055 1000ef5d InterlockedDecrement 16055->16056 16056->16055 16057 1000ef6d InterlockedDecrement 16056->16057 16058 1000ef76 InterlockedDecrement 16056->16058 16057->16056 16058->16046 16060 1000edba 16059->16060 16061 1000ed4d 16059->16061 16062 1000ee07 16060->16062 16063 10007b2f __mtdeletelocks 67 API calls 16060->16063 16061->16060 16069 10007b2f __mtdeletelocks 67 API calls 16061->16069 16072 1000ed81 16061->16072 16085 1000ee2e 16062->16085 16113 10010e30 16062->16113 16065 1000eddb 16063->16065 16067 10007b2f __mtdeletelocks 67 API calls 16065->16067 16073 1000edee 16067->16073 16068 10007b2f __mtdeletelocks 67 API calls 16074 1000edaf 16068->16074 16075 1000ed76 16069->16075 16070 10007b2f __mtdeletelocks 67 API calls 16070->16085 16071 1000ee6d 16076 10007b2f __mtdeletelocks 67 API calls 16071->16076 16077 10007b2f __mtdeletelocks 67 API calls 16072->16077 16088 1000eda2 16072->16088 16079 10007b2f __mtdeletelocks 67 API calls 16073->16079 16080 10007b2f __mtdeletelocks 67 API calls 16074->16080 16089 10011000 16075->16089 16082 1000ee73 16076->16082 16083 1000ed97 16077->16083 16078 10007b2f 67 API calls __mtdeletelocks 16078->16085 16084 1000edfc 16079->16084 16080->16060 16082->16041 16105 10010fc0 16083->16105 16087 10007b2f __mtdeletelocks 67 API calls 16084->16087 16085->16071 16085->16078 16087->16062 16088->16068 16090 10011086 16089->16090 16091 10011009 16089->16091 16090->16072 16092 1001101a 16091->16092 16093 10007b2f __mtdeletelocks 67 API calls 16091->16093 16094 1001102c 16092->16094 16095 10007b2f __mtdeletelocks 67 API calls 16092->16095 16093->16092 16096 1001103e 16094->16096 16097 10007b2f __mtdeletelocks 67 API calls 16094->16097 16095->16094 16098 10011050 16096->16098 16099 10007b2f __mtdeletelocks 67 API calls 16096->16099 16097->16096 16100 10011062 16098->16100 16101 10007b2f __mtdeletelocks 67 API calls 16098->16101 16099->16098 16102 10011074 16100->16102 16103 10007b2f __mtdeletelocks 67 API calls 16100->16103 16101->16100 16102->16090 16104 10007b2f __mtdeletelocks 67 API calls 16102->16104 16103->16102 16104->16090 16106 10010fc9 16105->16106 16107 10010ffd 16105->16107 16108 10010fd9 16106->16108 16109 10007b2f __mtdeletelocks 67 API calls 16106->16109 16107->16088 16110 10010feb 16108->16110 16111 10007b2f __mtdeletelocks 67 API calls 16108->16111 16109->16108 16110->16107 16112 10007b2f __mtdeletelocks 67 API calls 16110->16112 16111->16110 16112->16107 16114 10010e3d 16113->16114 16200 1000ee27 16113->16200 16115 10007b2f __mtdeletelocks 67 API calls 16114->16115 16116 10010e45 16115->16116 16117 10007b2f __mtdeletelocks 67 API calls 16116->16117 16118 10010e4d 16117->16118 16119 10007b2f __mtdeletelocks 67 API calls 16118->16119 16120 10010e55 16119->16120 16121 10007b2f __mtdeletelocks 67 API calls 16120->16121 16122 10010e5d 16121->16122 16123 10007b2f __mtdeletelocks 67 API calls 16122->16123 16124 10010e65 16123->16124 16125 10007b2f __mtdeletelocks 67 API calls 16124->16125 16126 10010e6d 16125->16126 16127 10007b2f __mtdeletelocks 67 API calls 16126->16127 16128 10010e74 16127->16128 16129 10007b2f __mtdeletelocks 67 API calls 16128->16129 16130 10010e7c 16129->16130 16131 10007b2f __mtdeletelocks 67 API calls 16130->16131 16132 10010e84 16131->16132 16133 10007b2f __mtdeletelocks 67 API calls 16132->16133 16134 10010e8c 16133->16134 16135 10007b2f __mtdeletelocks 67 API calls 16134->16135 16136 10010e94 16135->16136 16137 10007b2f __mtdeletelocks 67 API calls 16136->16137 16138 10010e9c 16137->16138 16139 10007b2f __mtdeletelocks 67 API calls 16138->16139 16140 10010ea4 16139->16140 16141 10007b2f __mtdeletelocks 67 API calls 16140->16141 16142 10010eac 16141->16142 16143 10007b2f __mtdeletelocks 67 API calls 16142->16143 16144 10010eb4 16143->16144 16145 10007b2f __mtdeletelocks 67 API calls 16144->16145 16146 10010ebc 16145->16146 16147 10007b2f __mtdeletelocks 67 API calls 16146->16147 16148 10010ec7 16147->16148 16149 10007b2f __mtdeletelocks 67 API calls 16148->16149 16150 10010ecf 16149->16150 16151 10007b2f __mtdeletelocks 67 API calls 16150->16151 16152 10010ed7 16151->16152 16153 10007b2f __mtdeletelocks 67 API calls 16152->16153 16154 10010edf 16153->16154 16155 10007b2f __mtdeletelocks 67 API calls 16154->16155 16156 10010ee7 16155->16156 16157 10007b2f __mtdeletelocks 67 API calls 16156->16157 16158 10010eef 16157->16158 16159 10007b2f __mtdeletelocks 67 API calls 16158->16159 16160 10010ef7 16159->16160 16161 10007b2f __mtdeletelocks 67 API calls 16160->16161 16200->16070 16201->16044 16205 1000943b LeaveCriticalSection 16202->16205 16204 1000f2ef 16204->16029 16205->16204 16207 100104e8 16206->16207 16208 100104da 16206->16208 16211 10010513 16207->16211 16212 10009230 __flswbuf 67 API calls 16207->16212 16209 10009230 __flswbuf 67 API calls 16208->16209 16210 100104df 16209->16210 16210->15755 16211->15755 16213 100104fc 16212->16213 16214 100082eb __close 67 API calls 16213->16214 16215 1001050c 16214->16215 16215->15755 16217 1000b155 __malloc_crt 67 API calls 16216->16217 16218 1001049d 16217->16218 16218->15758 16220 100103bd __close 16219->16220 16221 100103e0 16220->16221 16222 100103c5 16220->16222 16224 100103ee 16221->16224 16227 1001042f 16221->16227 16276 10009243 16222->16276 16226 10009243 __close 67 API calls 16224->16226 16229 100103f3 16226->16229 16279 10011917 16227->16279 16228 10009230 __flswbuf 67 API calls 16237 100103d2 __close 16228->16237 16230 10009230 __flswbuf 67 API calls 16229->16230 16232 100103fa 16230->16232 16234 100082eb __close 67 API calls 16232->16234 16233 10010435 16235 10010442 16233->16235 16236 10010458 16233->16236 16234->16237 16289 1000fd8f 16235->16289 16239 10009230 __flswbuf 67 API calls 16236->16239 16237->15746 16241 1001045d 16239->16241 16240 10010450 16348 10010483 16240->16348 16242 10009243 __close 67 API calls 16241->16242 16242->16240 16245 1000fc82 __close 16244->16245 16246 1000fc93 16245->16246 16247 1000fcaf 16245->16247 16248 10009243 __close 67 API calls 16246->16248 16249 1000fcbd 16247->16249 16251 1000fcde 16247->16251 16250 1000fc98 16248->16250 16252 10009243 __close 67 API calls 16249->16252 16255 10009230 __flswbuf 67 API calls 16250->16255 16253 1000fd24 16251->16253 16254 1000fcfe 16251->16254 16256 1000fcc2 16252->16256 16258 10011917 ___lock_fhandle 68 API calls 16253->16258 16257 10009243 __close 67 API calls 16254->16257 16269 1000fca0 __close 16255->16269 16259 10009230 __flswbuf 67 API calls 16256->16259 16260 1000fd03 16257->16260 16261 1000fd2a 16258->16261 16262 1000fcc9 16259->16262 16263 10009230 __flswbuf 67 API calls 16260->16263 16264 1000fd53 16261->16264 16265 1000fd37 16261->16265 16266 100082eb __close 67 API calls 16262->16266 16268 1000fd0a 16263->16268 16267 10009230 __flswbuf 67 API calls 16264->16267 16270 1000fbf3 __lseeki64_nolock 69 API calls 16265->16270 16266->16269 16271 1000fd58 16267->16271 16272 100082eb __close 67 API calls 16268->16272 16269->15746 16273 1000fd48 16270->16273 16274 10009243 __close 67 API calls 16271->16274 16272->16269 16388 1000fd85 16273->16388 16274->16273 16277 1000aaf7 _raise 67 API calls 16276->16277 16278 10009248 16277->16278 16278->16228 16280 10011923 __close 16279->16280 16281 1001197e 16280->16281 16283 10009513 __lock 67 API calls 16280->16283 16282 10011983 EnterCriticalSection 16281->16282 16284 100119a0 __close 16281->16284 16282->16284 16285 1001194f 16283->16285 16284->16233 16286 10011966 16285->16286 16288 1000e5c6 ___crtInitCritSecAndSpinCount 67 API calls 16285->16288 16351 100119ae 16286->16351 16288->16286 16290 1000fdcb 16289->16290 16334 1000fdc4 16289->16334 16291 1000fdf6 16290->16291 16292 1000fdcf 16290->16292 16295 1000fe38 16291->16295 16296 1000fe5e 16291->16296 16294 10009243 __close 67 API calls 16292->16294 16293 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16297 100103a9 16293->16297 16298 1000fdd4 16294->16298 16299 10009243 __close 67 API calls 16295->16299 16300 1000fe75 16296->16300 16355 1000fbf3 16296->16355 16297->16240 16301 10009230 __flswbuf 67 API calls 16298->16301 16302 1000fe3d 16299->16302 16305 100104d1 __flswbuf 67 API calls 16300->16305 16304 1000fddb 16301->16304 16306 10009230 __flswbuf 67 API calls 16302->16306 16307 100082eb __close 67 API calls 16304->16307 16308 1000fe83 16305->16308 16309 1000fe46 16306->16309 16307->16334 16310 100100c5 16308->16310 16312 1000ab6e _LocaleUpdate::_LocaleUpdate 67 API calls 16308->16312 16311 100082eb __close 67 API calls 16309->16311 16313 10010300 WriteFile 16310->16313 16314 100100d5 16310->16314 16311->16334 16315 1000fe9e GetConsoleMode 16312->16315 16316 10010327 GetLastError 16313->16316 16321 100100aa 16313->16321 16317 10010179 16314->16317 16338 100100e3 16314->16338 16315->16310 16318 1000fec3 16315->16318 16316->16321 16335 10010185 16317->16335 16336 10010228 16317->16336 16318->16310 16319 1000fed2 GetConsoleCP 16318->16319 16319->16321 16346 1000feef 16319->16346 16320 10010363 16322 10009230 __flswbuf 67 API calls 16320->16322 16320->16334 16321->16320 16323 1001033c 16321->16323 16321->16334 16325 10010380 16322->16325 16327 10010344 16323->16327 16328 10010358 16323->16328 16324 10010133 WriteFile 16324->16316 16324->16338 16331 10009243 __close 67 API calls 16325->16331 16326 1001027b WideCharToMultiByte 16326->16316 16333 100102ae WriteFile 16326->16333 16332 10009230 __flswbuf 67 API calls 16327->16332 16368 10009256 16328->16368 16329 100101de WriteFile 16329->16316 16329->16335 16331->16334 16339 10010349 16332->16339 16333->16336 16337 100102dc GetLastError 16333->16337 16334->16293 16335->16320 16335->16321 16335->16329 16336->16320 16336->16321 16336->16326 16336->16333 16337->16336 16338->16320 16338->16321 16338->16324 16341 10009243 __close 67 API calls 16339->16341 16341->16334 16342 10010c66 79 API calls __locking 16342->16346 16343 100119d9 11 API calls __putwch_nolock 16343->16346 16344 1000ff8f WideCharToMultiByte 16344->16321 16345 1000ffba WriteFile 16344->16345 16345->16316 16345->16346 16346->16316 16346->16321 16346->16342 16346->16343 16346->16344 16347 1000fffc WriteFile 16346->16347 16365 100108c3 16346->16365 16347->16316 16347->16346 16387 100119b7 LeaveCriticalSection 16348->16387 16350 1001048b 16350->16237 16354 1000943b LeaveCriticalSection 16351->16354 16353 100119b5 16353->16281 16354->16353 16373 100118a6 16355->16373 16357 1000fc0f 16358 1000fc17 16357->16358 16359 1000fc28 SetFilePointer 16357->16359 16360 10009230 __flswbuf 67 API calls 16358->16360 16361 1000fc40 GetLastError 16359->16361 16362 1000fc1c 16359->16362 16360->16362 16361->16362 16363 1000fc4a 16361->16363 16362->16300 16364 10009256 __dosmaperr 67 API calls 16363->16364 16364->16362 16366 1001088d __isleadbyte_l 77 API calls 16365->16366 16367 100108ce 16366->16367 16367->16346 16369 10009243 __close 67 API calls 16368->16369 16370 1000925c _realloc 16369->16370 16371 10009230 __flswbuf 67 API calls 16370->16371 16372 10009270 16371->16372 16372->16334 16374 100118c6 16373->16374 16375 100118af 16373->16375 16377 10009243 __close 67 API calls 16374->16377 16379 10011913 16374->16379 16376 10009243 __close 67 API calls 16375->16376 16378 100118b4 16376->16378 16380 100118f4 16377->16380 16381 10009230 __flswbuf 67 API calls 16378->16381 16379->16357 16382 10009230 __flswbuf 67 API calls 16380->16382 16383 100118bc 16381->16383 16384 100118fb 16382->16384 16383->16357 16385 100082eb __close 67 API calls 16384->16385 16386 1001190b 16385->16386 16386->16357 16387->16350 16391 100119b7 LeaveCriticalSection 16388->16391 16390 1000fd8d 16390->16269 16391->16390 16392->15685 16394 10007cb9 16393->16394 16400 10007c1a 16393->16400 16395 1000a715 _malloc 66 API calls 16394->16395 16396 10007cbf 16395->16396 16398 10009230 __flswbuf 66 API calls 16396->16398 16397 1000a6d2 __FF_MSGBANNER 66 API calls 16397->16400 16399 10007cc5 16398->16399 16399->15641 16400->16397 16402 1000a532 __amsg_exit 66 API calls 16400->16402 16403 10007c7d HeapAlloc 16400->16403 16404 1000a280 _malloc 3 API calls 16400->16404 16405 10007cb0 16400->16405 16406 10007ca4 16400->16406 16408 1000a715 _malloc 66 API calls 16400->16408 16409 10007ca2 16400->16409 16411 10007bbd 16400->16411 16402->16400 16403->16400 16404->16400 16405->15641 16407 10009230 __flswbuf 66 API calls 16406->16407 16407->16409 16408->16400 16410 10009230 __flswbuf 66 API calls 16409->16410 16410->16405 16412 10007bc9 __close 16411->16412 16413 10007bfa __close 16412->16413 16414 10009513 __lock 67 API calls 16412->16414 16413->16400 16415 10007bdf 16414->16415 16416 10009d60 ___sbh_alloc_block 5 API calls 16415->16416 16417 10007bea 16416->16417 16419 10007c03 16417->16419 16422 1000943b LeaveCriticalSection 16419->16422 16421 10007c0a 16421->16413 16422->16421 16424 100095f4 16423->16424 16429 10009896 16423->16429 16425 100097e0 VirtualFree 16424->16425 16424->16429 16426 10009844 16425->16426 16427 10009853 VirtualFree HeapFree 16426->16427 16426->16429 16428 10008360 ___sbh_free_block __VEC_memcpy 16427->16428 16428->16429 16429->15662 16433 1000943b LeaveCriticalSection 16430->16433 16432 10007b8c 16432->15654 16433->16432 16434 10008cc4 16435 10008cd0 16434->16435 16436 10008ccb 16434->16436 16440 10008bce 16435->16440 16448 1000d7ad 16436->16448 16439 10008ce1 16441 10008bda __close 16440->16441 16445 10008c27 ___DllMainCRTStartup 16441->16445 16446 10008c77 __close 16441->16446 16452 100089f5 16441->16452 16443 10008c57 16444 100089f5 __CRT_INIT@12 163 API calls 16443->16444 16443->16446 16444->16446 16445->16443 16445->16446 16447 100089f5 __CRT_INIT@12 163 API calls 16445->16447 16446->16439 16447->16443 16449 1000d7d0 16448->16449 16450 1000d7dd GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16448->16450 16449->16450 16451 1000d7d4 16449->16451 16450->16451 16451->16435 16453 10008a08 GetProcessHeap HeapAlloc 16452->16453 16454 10008b1f 16452->16454 16455 10008a2c GetVersionExA 16453->16455 16470 10008a25 16453->16470 16456 10008b25 16454->16456 16457 10008b5a 16454->16457 16458 10008a47 GetProcessHeap HeapFree 16455->16458 16459 10008a3c GetProcessHeap HeapFree 16455->16459 16462 10008b44 16456->16462 16456->16470 16636 1000a4d7 16456->16636 16460 10008bb8 16457->16460 16461 10008b5f 16457->16461 16463 10008a73 16458->16463 16459->16470 16460->16470 16639 1000aca7 16460->16639 16464 1000a9b0 __CRT_INIT@12 67 API calls 16461->16464 16469 1000d2b2 __CRT_INIT@12 68 API calls 16462->16469 16462->16470 16505 100092cf HeapCreate 16463->16505 16467 10008b64 16464->16467 16471 1000b195 __calloc_crt 67 API calls 16467->16471 16474 10008b4e 16469->16474 16470->16445 16475 10008b70 16471->16475 16472 10008aa9 16472->16470 16473 10008ab2 16472->16473 16515 1000ad10 GetModuleHandleA 16473->16515 16477 1000a9fb __mtterm 68 API calls 16474->16477 16475->16470 16478 1000a91e __amsg_exit 67 API calls 16475->16478 16480 10008b53 16477->16480 16481 10008b8e 16478->16481 16479 10008ab7 __RTC_Initialize 16484 10008aca GetCommandLineA 16479->16484 16498 10008abb 16479->16498 16482 10009329 __heap_term 4 API calls 16480->16482 16485 10008b95 16481->16485 16486 10008bac 16481->16486 16482->16470 16554 1000d62a 16484->16554 16488 1000aa38 __CRT_INIT@12 67 API calls 16485->16488 16489 10007b2f __mtdeletelocks 67 API calls 16486->16489 16491 10008b9c GetCurrentThreadId 16488->16491 16504 10008ac0 16489->16504 16491->16470 16493 10008ae4 16494 10008ae8 16493->16494 16600 1000d571 16493->16600 16594 1000a9fb 16494->16594 16548 10009329 16498->16548 16499 10008b08 16499->16504 16631 1000d2b2 16499->16631 16504->16470 16506 100092f2 16505->16506 16507 100092ef 16505->16507 16650 10009274 16506->16650 16507->16472 16510 10009301 16659 10009544 HeapAlloc 16510->16659 16511 10009325 16511->16472 16514 10009310 HeapDestroy 16514->16507 16516 1000ad22 16515->16516 16517 1000ad2b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 16515->16517 16518 1000a9fb __mtterm 68 API calls 16516->16518 16519 1000ad75 TlsAlloc 16517->16519 16520 1000ad27 16518->16520 16522 1000adc3 TlsSetValue 16519->16522 16523 1000ae8f 16519->16523 16520->16479 16522->16523 16524 1000add4 16522->16524 16523->16479 16677 1000a4e6 16524->16677 16529 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16530 1000adf4 16529->16530 16531 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16530->16531 16532 1000ae04 16531->16532 16533 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16532->16533 16534 1000ae14 16533->16534 16694 1000939d 16534->16694 16537 1000ae8a 16539 1000a9fb __mtterm 68 API calls 16537->16539 16538 1000a91e __amsg_exit 67 API calls 16540 1000ae35 16538->16540 16539->16523 16540->16537 16541 1000b195 __calloc_crt 67 API calls 16540->16541 16542 1000ae4e 16541->16542 16542->16537 16543 1000a91e __amsg_exit 67 API calls 16542->16543 16544 1000ae68 16543->16544 16544->16537 16545 1000ae6f 16544->16545 16546 1000aa38 __CRT_INIT@12 67 API calls 16545->16546 16547 1000ae77 GetCurrentThreadId 16546->16547 16547->16523 16549 10009335 16548->16549 16550 10009389 HeapDestroy 16548->16550 16551 10009378 HeapFree 16549->16551 16552 10009351 VirtualFree HeapFree 16549->16552 16550->16504 16551->16550 16552->16552 16553 10009377 16552->16553 16553->16551 16555 1000d646 GetEnvironmentStringsW 16554->16555 16558 1000d665 16554->16558 16556 1000d65a GetLastError 16555->16556 16557 1000d64e 16555->16557 16556->16558 16561 1000d680 GetEnvironmentStringsW 16557->16561 16562 1000d68f WideCharToMultiByte 16557->16562 16558->16557 16559 1000d700 16558->16559 16560 1000d708 GetEnvironmentStrings 16559->16560 16563 10008ada 16559->16563 16560->16563 16564 1000d718 16560->16564 16561->16562 16561->16563 16566 1000d6c3 16562->16566 16567 1000d6f5 FreeEnvironmentStringsW 16562->16567 16579 1000d05e 16563->16579 16568 1000b155 __malloc_crt 67 API calls 16564->16568 16569 1000b155 __malloc_crt 67 API calls 16566->16569 16567->16563 16570 1000d731 16568->16570 16571 1000d6c9 16569->16571 16572 1000d744 _memcpy_s 16570->16572 16573 1000d738 FreeEnvironmentStringsA 16570->16573 16571->16567 16574 1000d6d2 WideCharToMultiByte 16571->16574 16577 1000d74c FreeEnvironmentStringsA 16572->16577 16573->16563 16575 1000d6ec 16574->16575 16576 1000d6e3 16574->16576 16575->16567 16578 10007b2f __mtdeletelocks 67 API calls 16576->16578 16577->16563 16578->16575 16704 1000a044 16579->16704 16581 1000d06a GetStartupInfoA 16582 1000b195 __calloc_crt 67 API calls 16581->16582 16583 1000d08b 16582->16583 16584 1000d2a9 __close 16583->16584 16585 1000d1f0 16583->16585 16588 1000b195 __calloc_crt 67 API calls 16583->16588 16590 1000d173 16583->16590 16584->16493 16585->16584 16586 1000d226 GetStdHandle 16585->16586 16587 1000d28b SetHandleCount 16585->16587 16589 1000d238 GetFileType 16585->16589 16592 1000e5c6 ___crtInitCritSecAndSpinCount 67 API calls 16585->16592 16586->16585 16587->16584 16588->16583 16589->16585 16590->16584 16590->16585 16591 1000d19c GetFileType 16590->16591 16593 1000e5c6 ___crtInitCritSecAndSpinCount 67 API calls 16590->16593 16591->16590 16592->16585 16593->16590 16595 1000aa05 16594->16595 16599 1000aa11 16594->16599 16596 1000a91e __amsg_exit 67 API calls 16595->16596 16596->16599 16597 1000aa33 16597->16597 16598 1000aa25 TlsFree 16598->16597 16599->16597 16599->16598 16601 1000d584 16600->16601 16602 1000d589 GetModuleFileNameA 16600->16602 16705 1000f6de 16601->16705 16604 1000d5b0 16602->16604 16709 1000d3d9 16604->16709 16607 1000b155 __malloc_crt 67 API calls 16608 1000d5f2 16607->16608 16609 1000d3d9 _parse_cmdline 77 API calls 16608->16609 16610 10008af4 16608->16610 16609->16610 16610->16499 16611 1000d2fe 16610->16611 16612 1000d30b 16611->16612 16614 1000d310 _strlen 16611->16614 16613 1000f6de ___initmbctable 111 API calls 16612->16613 16613->16614 16615 1000b195 __calloc_crt 67 API calls 16614->16615 16618 10008afd 16614->16618 16623 1000d343 _strlen 16615->16623 16616 1000d39e 16617 10007b2f __mtdeletelocks 67 API calls 16616->16617 16617->16618 16618->16499 16625 1000a352 16618->16625 16619 1000b195 __calloc_crt 67 API calls 16619->16623 16620 1000d3c3 16621 10007b2f __mtdeletelocks 67 API calls 16620->16621 16621->16618 16623->16616 16623->16618 16623->16619 16623->16620 16624 100081ef __invoke_watson 10 API calls 16623->16624 16899 1000b7b8 16623->16899 16624->16623 16626 1000a35b __except_handler4 16625->16626 16908 1000e7df 16626->16908 16628 1000a37a __initterm_e 16630 1000a39b __except_handler4 16628->16630 16912 10008080 16628->16912 16630->16499 16633 1000d2b9 16631->16633 16632 1000d2fb 16632->16494 16633->16632 16634 1000d2cd DeleteCriticalSection 16633->16634 16635 10007b2f __mtdeletelocks 67 API calls 16633->16635 16634->16633 16635->16633 17012 1000a3e4 16636->17012 16638 1000a4e2 16638->16462 16640 1000acb0 16639->16640 16649 1000acfb 16639->16649 16643 1000acb9 TlsGetValue 16640->16643 16644 1000acdc 16640->16644 16641 1000ad06 TlsSetValue 16642 1000ad0f 16641->16642 16642->16470 16643->16644 16645 1000accc TlsGetValue 16643->16645 16646 1000a91e __amsg_exit 67 API calls 16644->16646 16645->16644 16647 1000acf2 16646->16647 17035 1000ab86 16647->17035 16649->16641 16649->16642 16661 1000a2df 16650->16661 16652 1000928b 16653 1000929a 16652->16653 16668 100081ef 16652->16668 16654 1000a316 __amsg_exit 67 API calls 16653->16654 16656 100092a6 16654->16656 16657 100081ef __invoke_watson 10 API calls 16656->16657 16658 100092b5 16656->16658 16657->16658 16658->16510 16658->16511 16660 1000930b 16659->16660 16660->16511 16660->16514 16662 1000a2ea 16661->16662 16663 10009230 __flswbuf 67 API calls 16662->16663 16664 1000a310 16662->16664 16665 1000a2ef 16663->16665 16664->16652 16666 100082eb __close 67 API calls 16665->16666 16667 1000a2ff 16666->16667 16667->16652 16675 1000b330 16668->16675 16670 10008280 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16671 100082c3 GetCurrentProcess TerminateProcess 16670->16671 16674 100082b7 __invoke_watson 16670->16674 16672 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16671->16672 16673 100082e3 16672->16673 16673->16653 16674->16671 16676 1000b33c __VEC_memzero 16675->16676 16676->16670 16698 1000a915 16677->16698 16679 1000a4ec __init_pointers 16701 1000e54e 16679->16701 16682 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16683 1000a528 16682->16683 16684 1000a8a7 TlsGetValue 16683->16684 16685 1000a8ba 16684->16685 16686 1000a8db GetModuleHandleA 16684->16686 16685->16686 16688 1000a8c4 TlsGetValue 16685->16688 16687 1000a8ec 16686->16687 16693 1000a8d3 16686->16693 16689 1000a83b __amsg_exit 63 API calls 16687->16689 16691 1000a8cf 16688->16691 16690 1000a8f1 16689->16690 16692 1000a8f5 GetProcAddress 16690->16692 16690->16693 16691->16686 16691->16693 16692->16693 16693->16529 16695 100093a6 16694->16695 16696 100093d4 16695->16696 16697 1000e5c6 ___crtInitCritSecAndSpinCount 67 API calls 16695->16697 16696->16537 16696->16538 16697->16695 16699 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16698->16699 16700 1000a91c 16699->16700 16700->16679 16702 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16701->16702 16703 1000a51e 16702->16703 16703->16682 16704->16581 16706 1000f6e7 16705->16706 16708 1000f6ee 16705->16708 16715 1000f544 16706->16715 16708->16602 16711 1000d3f6 16709->16711 16713 1000d463 16711->16713 16893 10010cce 16711->16893 16712 1000d561 16712->16607 16712->16610 16713->16712 16714 10010cce 77 API calls _parse_cmdline 16713->16714 16714->16713 16716 1000f550 __close 16715->16716 16717 1000ab6e _LocaleUpdate::_LocaleUpdate 67 API calls 16716->16717 16718 1000f559 16717->16718 16719 1000f24d _LocaleUpdate::_LocaleUpdate 69 API calls 16718->16719 16720 1000f563 16719->16720 16746 1000f2f1 16720->16746 16723 1000b155 __malloc_crt 67 API calls 16724 1000f584 16723->16724 16725 1000f6a3 __close 16724->16725 16753 1000f36b 16724->16753 16725->16708 16728 1000f5b4 InterlockedDecrement 16729 1000f5c4 16728->16729 16730 1000f5d5 InterlockedIncrement 16728->16730 16729->16730 16735 10007b2f __mtdeletelocks 67 API calls 16729->16735 16730->16725 16736 1000f5eb 16730->16736 16731 1000f6c3 16734 10009230 __flswbuf 67 API calls 16731->16734 16732 1000f6b0 16732->16725 16732->16731 16733 10007b2f __mtdeletelocks 67 API calls 16732->16733 16733->16731 16734->16725 16737 1000f5d4 16735->16737 16736->16725 16738 10009513 __lock 67 API calls 16736->16738 16737->16730 16740 1000f5ff InterlockedDecrement 16738->16740 16741 1000f67b 16740->16741 16742 1000f68e InterlockedIncrement 16740->16742 16741->16742 16744 10007b2f __mtdeletelocks 67 API calls 16741->16744 16763 1000f6a5 16742->16763 16745 1000f68d 16744->16745 16745->16742 16747 1000bbfe _LocaleUpdate::_LocaleUpdate 77 API calls 16746->16747 16748 1000f303 16747->16748 16749 1000f32c 16748->16749 16750 1000f30e GetOEMCP 16748->16750 16751 1000f331 GetACP 16749->16751 16752 1000f31e 16749->16752 16750->16752 16751->16752 16752->16723 16752->16725 16754 1000f2f1 getSystemCP 79 API calls 16753->16754 16755 1000f389 16754->16755 16756 1000f394 setSBCS 16755->16756 16759 1000f3d8 IsValidCodePage 16755->16759 16762 1000f3fd _memset __setmbcp 16755->16762 16757 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16756->16757 16758 1000f542 16757->16758 16758->16728 16758->16732 16759->16756 16760 1000f3ea GetCPInfo 16759->16760 16760->16756 16760->16762 16766 1000f0c3 GetCPInfo 16762->16766 16892 1000943b LeaveCriticalSection 16763->16892 16765 1000f6ac 16765->16725 16767 1000f0fa _memset 16766->16767 16768 1000f1a3 16766->16768 16776 1001128e 16767->16776 16772 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16768->16772 16774 1000f245 16772->16774 16774->16762 16775 100116b2 ___crtLCMapStringA 102 API calls 16775->16768 16777 1000bbfe _LocaleUpdate::_LocaleUpdate 77 API calls 16776->16777 16778 1001129f 16777->16778 16786 100110d6 16778->16786 16781 100116b2 16782 1000bbfe _LocaleUpdate::_LocaleUpdate 77 API calls 16781->16782 16783 100116c3 16782->16783 16845 10011310 16783->16845 16787 100110f5 GetStringTypeW 16786->16787 16788 10011120 16786->16788 16789 10011115 GetLastError 16787->16789 16790 1001110d 16787->16790 16788->16790 16791 10011207 16788->16791 16789->16788 16792 10011159 MultiByteToWideChar 16790->16792 16809 10011201 16790->16809 16814 10011e31 GetLocaleInfoA 16791->16814 16798 10011186 16792->16798 16792->16809 16794 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16796 1000f15e 16794->16796 16796->16781 16797 1001119b _memset __alloca_probe_16 16803 100111d4 MultiByteToWideChar 16797->16803 16797->16809 16798->16797 16801 10007c0c _malloc 67 API calls 16798->16801 16799 10011258 GetStringTypeA 16800 10011273 16799->16800 16799->16809 16806 10007b2f __mtdeletelocks 67 API calls 16800->16806 16801->16797 16804 100111fb 16803->16804 16805 100111ea GetStringTypeW 16803->16805 16810 1000fa35 16804->16810 16805->16804 16806->16809 16809->16794 16811 1000fa3d 16810->16811 16812 1000fa4e 16810->16812 16811->16812 16813 10007b2f __mtdeletelocks 67 API calls 16811->16813 16812->16809 16813->16812 16815 10011e62 16814->16815 16816 10011e5d 16814->16816 16817 10011814 ___ansicp 90 API calls 16815->16817 16818 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16816->16818 16817->16816 16819 1001122b 16818->16819 16819->16799 16819->16809 16820 10011e78 16819->16820 16821 10011eb6 GetCPInfo 16820->16821 16825 10011f40 16820->16825 16822 10011f2b MultiByteToWideChar 16821->16822 16823 10011ecd 16821->16823 16822->16825 16829 10011ee6 _strlen 16822->16829 16823->16822 16826 10011ed3 GetCPInfo 16823->16826 16824 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16828 1001124c 16824->16828 16825->16824 16826->16822 16827 10011ee0 16826->16827 16827->16822 16827->16829 16828->16799 16828->16809 16830 10007c0c _malloc 67 API calls 16829->16830 16832 10011f18 _memset __alloca_probe_16 16829->16832 16830->16832 16831 10011f75 MultiByteToWideChar 16833 10011f8d 16831->16833 16834 10011fac 16831->16834 16832->16825 16832->16831 16836 10011fb1 16833->16836 16837 10011f94 WideCharToMultiByte 16833->16837 16835 1000fa35 __freea 67 API calls 16834->16835 16835->16825 16838 10011fd0 16836->16838 16839 10011fbc WideCharToMultiByte 16836->16839 16837->16834 16840 1000b195 __calloc_crt 67 API calls 16838->16840 16839->16834 16839->16838 16841 10011fd8 16840->16841 16841->16834 16842 10011fe1 WideCharToMultiByte 16841->16842 16842->16834 16843 10011ff3 16842->16843 16844 10007b2f __mtdeletelocks 67 API calls 16843->16844 16844->16834 16846 1001132f LCMapStringW 16845->16846 16850 1001134a 16845->16850 16847 10011352 GetLastError 16846->16847 16846->16850 16847->16850 16848 10011547 16852 10011e31 ___ansicp 91 API calls 16848->16852 16849 100113a4 16851 100113bd MultiByteToWideChar 16849->16851 16853 1001153e 16849->16853 16850->16848 16850->16849 16851->16853 16860 100113ea 16851->16860 16855 1001156f 16852->16855 16854 10007ccf __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 16853->16854 16856 1000f17e 16854->16856 16855->16853 16857 10011663 LCMapStringA 16855->16857 16858 10011588 16855->16858 16856->16775 16861 100115bf 16857->16861 16862 10011e78 ___convertcp 74 API calls 16858->16862 16859 1001143b MultiByteToWideChar 16863 10011454 LCMapStringW 16859->16863 16864 10011535 16859->16864 16866 10007c0c _malloc 67 API calls 16860->16866 16873 10011403 __alloca_probe_16 16860->16873 16865 1001168a 16861->16865 16870 10007b2f __mtdeletelocks 67 API calls 16861->16870 16867 1001159a 16862->16867 16863->16864 16869 10011475 16863->16869 16868 1000fa35 __freea 67 API calls 16864->16868 16865->16853 16874 10007b2f __mtdeletelocks 67 API calls 16865->16874 16866->16873 16867->16853 16871 100115a4 LCMapStringA 16867->16871 16868->16853 16872 1001147d 16869->16872 16878 100114a6 16869->16878 16870->16865 16871->16861 16876 100115c6 16871->16876 16872->16864 16875 1001148f LCMapStringW 16872->16875 16873->16853 16873->16859 16874->16853 16875->16864 16879 100115d7 _memset __alloca_probe_16 16876->16879 16881 10007c0c _malloc 67 API calls 16876->16881 16877 100114f5 LCMapStringW 16882 1001150d WideCharToMultiByte 16877->16882 16883 1001152f 16877->16883 16880 10007c0c _malloc 67 API calls 16878->16880 16884 100114c1 __alloca_probe_16 16878->16884 16879->16861 16885 10011615 LCMapStringA 16879->16885 16880->16884 16881->16879 16882->16883 16884->16864 16884->16877 16887 10011631 16885->16887 16888 10011635 16885->16888 16892->16765 16896 10010c7d 16893->16896 16897 1000bbfe _LocaleUpdate::_LocaleUpdate 77 API calls 16896->16897 16898 10010c8e 16897->16898 16898->16711 16900 1000b7c5 16899->16900 16901 1000b7cd 16899->16901 16900->16901 16906 1000b7f4 16900->16906 16902 10009230 __flswbuf 67 API calls 16901->16902 16903 1000b7d2 16902->16903 16904 100082eb __close 67 API calls 16903->16904 16905 1000b7e1 16904->16905 16905->16623 16906->16905 16907 10009230 __flswbuf 67 API calls 16906->16907 16907->16903 16909 1000e7e3 16908->16909 16910 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16909->16910 16911 1000e7fb 16909->16911 16910->16909 16911->16628 16915 10008044 16912->16915 16914 10008089 16914->16630 16916 10008050 __close 16915->16916 16923 1000a295 16916->16923 16922 10008071 __close 16922->16914 16924 10009513 __lock 67 API calls 16923->16924 16925 10008055 16924->16925 16926 10007f5c 16925->16926 16927 1000a91e __amsg_exit 67 API calls 16926->16927 16928 10007f6c 16927->16928 16929 1000a91e __amsg_exit 67 API calls 16928->16929 16930 10007f7d 16929->16930 16938 10008000 16930->16938 16946 1000b715 16930->16946 16932 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16933 10007ff5 16932->16933 16935 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16933->16935 16934 10007f9b 16937 10007fbd 16934->16937 16942 10007fe6 16934->16942 16959 1000b1dd 16934->16959 16935->16938 16937->16938 16939 1000b1dd __realloc_crt 73 API calls 16937->16939 16940 10007fd4 16937->16940 16943 1000807a 16938->16943 16939->16940 16940->16938 16941 1000a8a7 ___crtInitCritSecAndSpinCount 67 API calls 16940->16941 16941->16942 16942->16932 17008 1000a29e 16943->17008 16947 1000b721 __close 16946->16947 16948 1000b731 16947->16948 16949 1000b74e 16947->16949 16950 10009230 __flswbuf 67 API calls 16948->16950 16951 1000b78f HeapSize 16949->16951 16953 10009513 __lock 67 API calls 16949->16953 16952 1000b736 16950->16952 16954 1000b746 __close 16951->16954 16955 100082eb __close 67 API calls 16952->16955 16956 1000b75e ___sbh_find_block 16953->16956 16954->16934 16955->16954 16964 1000b7af 16956->16964 16962 1000b1e1 16959->16962 16961 1000b223 16961->16937 16962->16961 16963 1000b204 Sleep 16962->16963 16968 1000f81a 16962->16968 16963->16962 16967 1000943b LeaveCriticalSection 16964->16967 16966 1000b78a 16966->16951 16966->16954 16967->16966 16969 1000f826 __close 16968->16969 16970 1000f83b 16969->16970 16971 1000f82d 16969->16971 16973 1000f842 16970->16973 16974 1000f84e 16970->16974 16972 10007c0c _malloc 67 API calls 16971->16972 16976 1000f835 __close _realloc 16972->16976 16975 10007b2f __mtdeletelocks 67 API calls 16973->16975 16981 1000f9c0 16974->16981 17003 1000f85b _memcpy_s ___sbh_resize_block ___sbh_find_block 16974->17003 16975->16976 16976->16962 16977 1000f9f3 16979 1000a715 _malloc 67 API calls 16977->16979 16978 1000f9c5 HeapReAlloc 16978->16976 16978->16981 16982 1000f9f9 16979->16982 16980 10009513 __lock 67 API calls 16980->17003 16981->16977 16981->16978 16983 1000fa17 16981->16983 16985 1000a715 _malloc 67 API calls 16981->16985 16987 1000fa0d 16981->16987 16984 10009230 __flswbuf 67 API calls 16982->16984 16983->16976 16986 10009230 __flswbuf 67 API calls 16983->16986 16984->16976 16985->16981 16988 1000fa20 GetLastError 16986->16988 16990 10009230 __flswbuf 67 API calls 16987->16990 16988->16976 16992 1000f98e 16990->16992 16991 1000f8e6 HeapAlloc 16991->17003 16992->16976 16993 1000f993 GetLastError 16992->16993 16993->16976 16994 1000f93b HeapReAlloc 16994->17003 16995 10009d60 ___sbh_alloc_block 5 API calls 16995->17003 16996 1000f9a6 16996->16976 16999 10009230 __flswbuf 67 API calls 16996->16999 16997 1000a715 _malloc 67 API calls 16997->17003 16998 100095b7 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 16998->17003 17001 1000f9b3 16999->17001 17000 1000f989 17002 10009230 __flswbuf 67 API calls 17000->17002 17001->16976 17001->16988 17002->16992 17003->16976 17003->16977 17003->16980 17003->16991 17003->16994 17003->16995 17003->16996 17003->16997 17003->16998 17003->17000 17004 1000f95e 17003->17004 17007 1000943b LeaveCriticalSection 17004->17007 17006 1000f965 17006->17003 17007->17006 17011 1000943b LeaveCriticalSection 17008->17011 17010 1000807f 17010->16922 17011->17010 17013 1000a3f0 __close 17012->17013 17014 10009513 __lock 67 API calls 17013->17014 17015 1000a3f7 17014->17015 17016 1000a466 _abort 17015->17016 17019 1000a91e __amsg_exit 67 API calls 17015->17019 17029 1000a4b1 17016->17029 17021 1000a426 17019->17021 17020 1000a4ae __close 17020->16638 17023 1000a91e __amsg_exit 67 API calls 17021->17023 17026 1000a434 17023->17026 17024 1000a4a5 17025 1000a280 _malloc 3 API calls 17024->17025 17025->17020 17026->17016 17027 1000a915 _raise 67 API calls 17026->17027 17028 1000a91e __amsg_exit 67 API calls 17026->17028 17027->17026 17028->17026 17030 1000a4b7 17029->17030 17032 1000a492 17029->17032 17034 1000943b LeaveCriticalSection 17030->17034 17032->17020 17033 1000943b LeaveCriticalSection 17032->17033 17033->17024 17034->17032 17037 1000ab92 __close 17035->17037 17036 1000ac86 __close 17036->16649 17037->17036 17038 1000abaa 17037->17038 17040 10007b2f __mtdeletelocks 67 API calls 17037->17040 17039 1000abb8 17038->17039 17041 10007b2f __mtdeletelocks 67 API calls 17038->17041 17042 1000abc6 17039->17042 17043 10007b2f __mtdeletelocks 67 API calls 17039->17043 17040->17038 17041->17039 17044 1000abd4 17042->17044 17045 10007b2f __mtdeletelocks 67 API calls 17042->17045 17043->17042 17046 1000abe2 17044->17046 17048 10007b2f __mtdeletelocks 67 API calls 17044->17048 17045->17044 17047 1000abf0 17046->17047 17049 10007b2f __mtdeletelocks 67 API calls 17046->17049 17050 1000ac01 17047->17050 17051 10007b2f __mtdeletelocks 67 API calls 17047->17051 17048->17046 17049->17047 17052 10009513 __lock 67 API calls 17050->17052 17051->17050 17053 1000ac09 17052->17053 17054 1000ac15 InterlockedDecrement 17053->17054 17055 1000ac2e 17053->17055 17054->17055 17057 1000ac20 17054->17057 17069 1000ac92 17055->17069 17057->17055 17060 10007b2f __mtdeletelocks 67 API calls 17057->17060 17059 10009513 __lock 67 API calls 17061 1000ac42 17059->17061 17060->17055 17062 1000eeff ___removelocaleref 8 API calls 17061->17062 17068 1000ac73 17061->17068 17066 1000ac57 17062->17066 17065 10007b2f __mtdeletelocks 67 API calls 17065->17036 17067 1000ed39 ___freetlocinfo 67 API calls 17066->17067 17066->17068 17067->17068 17072 1000ac9e 17068->17072 17075 1000943b LeaveCriticalSection 17069->17075 17071 1000ac3b 17071->17059 17076 1000943b LeaveCriticalSection 17072->17076 17074 1000ac80 17074->17065 17075->17071 17076->17074 14472 401160 14527 4028b8 14472->14527 14474 40116c GetStartupInfoA GetProcessHeap HeapAlloc 14475 4011ab GetVersionExA 14474->14475 14476 40119e 14474->14476 14478 4011c9 GetProcessHeap HeapFree 14475->14478 14479 4011bb GetProcessHeap HeapFree 14475->14479 14617 4010fb 14476->14617 14481 4011f5 14478->14481 14480 4011a5 ___crtInitCritSecAndSpinCount 14479->14480 14528 40285e HeapCreate 14481->14528 14483 401236 14484 401242 14483->14484 14486 4010fb _fast_error_exit 61 API calls 14483->14486 14625 40267f GetModuleHandleA 14484->14625 14486->14484 14487 401248 14488 401254 __RTC_Initialize 14487->14488 14489 40124c 14487->14489 14538 401fab 14488->14538 14490 4010fb _fast_error_exit 61 API calls 14489->14490 14491 401253 14490->14491 14491->14488 14493 401261 14494 401265 14493->14494 14495 40126d GetCommandLineA 14493->14495 14658 401499 14494->14658 14553 401e76 14495->14553 14501 401287 14502 401293 14501->14502 14503 40128b 14501->14503 14579 401b4a 14502->14579 14504 401499 __amsg_exit 61 API calls 14503->14504 14506 401292 14504->14506 14506->14502 14508 4012a4 14593 4015b5 14508->14593 14509 40129c 14510 401499 __amsg_exit 61 API calls 14509->14510 14512 4012a3 14510->14512 14512->14508 14513 4012aa 14514 4012b6 14513->14514 14515 4012af 14513->14515 14599 401aed 14514->14599 14516 401499 __amsg_exit 61 API calls 14515->14516 14518 4012b5 14516->14518 14518->14514 14519 4012bb 14520 4012c0 14519->14520 14605 401050 14519->14605 14520->14519 14522 4012d7 14523 4012e6 14522->14523 14614 401729 14522->14614 14676 40174b 14523->14676 14527->14474 14529 402881 14528->14529 14530 40287e 14528->14530 14679 402803 14529->14679 14530->14483 14533 402890 14688 40489e HeapAlloc 14533->14688 14534 4028b4 14534->14483 14537 40289f HeapDestroy 14537->14530 14948 4028b8 14538->14948 14540 401fb7 GetStartupInfoA 14541 404107 __calloc_crt 61 API calls 14540->14541 14549 401fd8 14541->14549 14542 4021f6 ___crtInitCritSecAndSpinCount 14542->14493 14543 402173 GetStdHandle 14548 40213d 14543->14548 14544 404107 __calloc_crt 61 API calls 14544->14549 14545 4021d8 SetHandleCount 14545->14542 14546 402185 GetFileType 14546->14548 14547 4020c0 14547->14542 14547->14548 14550 4020e9 GetFileType 14547->14550 14552 403383 ___crtInitCritSecAndSpinCount 61 API calls 14547->14552 14548->14542 14548->14543 14548->14545 14548->14546 14551 403383 ___crtInitCritSecAndSpinCount 61 API calls 14548->14551 14549->14542 14549->14544 14549->14547 14549->14548 14550->14547 14551->14548 14552->14547 14554 401e92 GetEnvironmentStringsW 14553->14554 14555 401eb1 14553->14555 14556 401ea6 GetLastError 14554->14556 14557 401e9a 14554->14557 14555->14557 14558 401f4c 14555->14558 14556->14555 14559 401ecc GetEnvironmentStringsW 14557->14559 14564 401edb 14557->14564 14560 401f54 GetEnvironmentStrings 14558->14560 14561 40127d 14558->14561 14559->14561 14559->14564 14560->14561 14562 401f64 14560->14562 14665 401dbd 14561->14665 14567 4040c7 __malloc_crt 61 API calls 14562->14567 14563 401ef0 WideCharToMultiByte 14565 401f41 FreeEnvironmentStringsW 14563->14565 14566 401f0f 14563->14566 14564->14563 14564->14564 14565->14561 14568 4040c7 __malloc_crt 61 API calls 14566->14568 14570 401f7d 14567->14570 14569 401f15 14568->14569 14569->14565 14573 401f1e WideCharToMultiByte 14569->14573 14571 401f90 14570->14571 14572 401f84 FreeEnvironmentStringsA 14570->14572 14949 4041a0 14571->14949 14572->14561 14575 401f38 14573->14575 14576 401f2f 14573->14576 14575->14565 14578 404039 __setenvp 61 API calls 14576->14578 14578->14575 14580 401b57 14579->14580 14582 401b5c _strlen 14579->14582 14953 40401b 14580->14953 14583 404107 __calloc_crt 61 API calls 14582->14583 14586 401298 14582->14586 14591 401b8f _strlen 14583->14591 14584 401bea 14585 404039 __setenvp 61 API calls 14584->14585 14585->14586 14586->14508 14586->14509 14587 404107 __calloc_crt 61 API calls 14587->14591 14588 401c0f 14589 404039 __setenvp 61 API calls 14588->14589 14589->14586 14591->14584 14591->14586 14591->14587 14591->14588 14592 402d4d __invoke_watson 5 API calls 14591->14592 14957 4037eb 14591->14957 14592->14591 14594 4015be __except_handler4 14593->14594 15384 402ff1 14594->15384 14596 4015dd __initterm_e 14598 4015fe __except_handler4 14596->14598 15388 402fdf 14596->15388 14598->14513 14600 401af9 14599->14600 14603 401afe 14599->14603 14601 40401b ___initmbctable 105 API calls 14600->14601 14601->14603 14602 401b3a 14602->14519 14603->14602 15499 403969 14603->15499 15505 401000 14605->15505 14607 40107e 14609 401096 14607->14609 14610 401000 3 API calls 14607->14610 14608 4010a0 MessageBoxA 14608->14522 14609->14608 14611 4010c2 14609->14611 14610->14609 14612 4010ca ?nf_registerDriver@nfapi@@YA?AW4_NF_STATUS@@PBD 14611->14612 14613 4010db ?nf_unRegisterDriver@nfapi@@YA?AW4_NF_STATUS@@PBD 14611->14613 14612->14522 14613->14522 15511 401647 14614->15511 14616 401736 14616->14523 14618 401104 14617->14618 14619 401109 14617->14619 14620 401955 __FF_MSGBANNER 61 API calls 14618->14620 14621 4017b5 _abort 61 API calls 14619->14621 14620->14619 14622 401112 14621->14622 14623 4014e3 _malloc 3 API calls 14622->14623 14624 40111c 14623->14624 14624->14480 14626 402691 14625->14626 14627 40269a GetProcAddress GetProcAddress GetProcAddress GetProcAddress 14625->14627 15539 4023d3 14626->15539 14628 4026e4 TlsAlloc 14627->14628 14632 402732 TlsSetValue 14628->14632 14633 4027fe 14628->14633 14632->14633 14634 402743 14632->14634 14633->14487 15550 401769 14634->15550 14637 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 14638 402753 14637->14638 14639 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 14638->14639 14640 402763 14639->14640 14641 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 14640->14641 14642 402773 14641->14642 14643 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 14642->14643 14644 402783 14643->14644 15557 402b9c 14644->15557 14647 4027f9 14649 4023d3 __mtterm 64 API calls 14647->14649 14648 40232a ___crtInitCritSecAndSpinCount 61 API calls 14650 4027a4 14648->14650 14649->14633 14650->14647 14651 404107 __calloc_crt 61 API calls 14650->14651 14652 4027bd 14651->14652 14652->14647 14653 40232a ___crtInitCritSecAndSpinCount 61 API calls 14652->14653 14654 4027d7 14653->14654 14654->14647 14655 4027de 14654->14655 14656 402410 _raise 61 API calls 14655->14656 14657 4027e6 GetCurrentThreadId 14656->14657 14657->14633 14659 401955 __FF_MSGBANNER 61 API calls 14658->14659 14660 40149e 14659->14660 14661 4017b5 _abort 61 API calls 14660->14661 14662 4014a7 14661->14662 14663 40232a ___crtInitCritSecAndSpinCount 61 API calls 14662->14663 14664 40126c 14663->14664 14664->14495 14666 401dd0 14665->14666 14667 401dd5 GetModuleFileNameA 14665->14667 14669 40401b ___initmbctable 105 API calls 14666->14669 14668 401dfc 14667->14668 15564 401c25 14668->15564 14669->14667 14671 401e58 14671->14501 14673 4040c7 __malloc_crt 61 API calls 14674 401e3e 14673->14674 14674->14671 14675 401c25 _parse_cmdline 71 API calls 14674->14675 14675->14671 14677 401647 _abort 61 API calls 14676->14677 14678 4012eb 14677->14678 14678->14480 14690 401542 14679->14690 14684 402829 14703 401579 14684->14703 14685 402835 14686 402844 14685->14686 14687 402d4d __invoke_watson 5 API calls 14685->14687 14686->14533 14686->14534 14687->14686 14689 40289a 14688->14689 14689->14534 14689->14537 14691 40154d 14690->14691 14693 401573 14691->14693 14710 402ea8 14691->14710 14693->14684 14697 402d4d 14693->14697 14946 4055f0 14697->14946 14699 402dde IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14700 402e21 GetCurrentProcess TerminateProcess 14699->14700 14701 402e15 __invoke_watson 14699->14701 14702 402e41 __except_handler4 14700->14702 14701->14700 14702->14684 14704 401584 14703->14704 14705 402ea8 _malloc 61 API calls 14704->14705 14706 4015a9 14704->14706 14707 401589 14705->14707 14706->14685 14708 402e49 _strcat_s 61 API calls 14707->14708 14709 401599 14708->14709 14709->14685 14716 4024cf GetLastError 14710->14716 14712 401552 14713 402e49 14712->14713 14714 40232a ___crtInitCritSecAndSpinCount 61 API calls 14713->14714 14715 402e57 __invoke_watson 14714->14715 14730 4023a1 TlsGetValue 14716->14730 14719 40253a SetLastError 14719->14712 14724 402531 14764 404039 14724->14764 14725 402519 14750 402410 14725->14750 14728 402521 GetCurrentThreadId 14728->14719 14729 402537 14729->14719 14731 4023b4 14730->14731 14732 4023cf 14730->14732 14733 40232a ___crtInitCritSecAndSpinCount 59 API calls 14731->14733 14732->14719 14735 404107 14732->14735 14734 4023bf TlsSetValue 14733->14734 14734->14732 14737 40410b 14735->14737 14738 4024f8 14737->14738 14739 40412b Sleep 14737->14739 14777 405e20 14737->14777 14738->14719 14740 40232a TlsGetValue 14738->14740 14739->14737 14741 40233d 14740->14741 14742 40235e GetModuleHandleA 14740->14742 14741->14742 14743 402347 TlsGetValue 14741->14743 14744 40236f 14742->14744 14749 402356 14742->14749 14746 402352 14743->14746 14914 402247 14744->14914 14746->14742 14746->14749 14747 402374 14748 402378 GetProcAddress 14747->14748 14747->14749 14748->14749 14749->14724 14749->14725 14919 4028b8 14750->14919 14752 40241c GetModuleHandleA 14753 40246d InterlockedIncrement 14752->14753 14754 40243e 14752->14754 14756 402d12 __lock 57 API calls 14753->14756 14755 402247 ___crtInitCritSecAndSpinCount 57 API calls 14754->14755 14757 402443 14755->14757 14758 402494 14756->14758 14757->14753 14759 402447 GetProcAddress GetProcAddress 14757->14759 14920 4046d8 InterlockedIncrement 14758->14920 14759->14753 14761 4024b3 14932 4024c6 14761->14932 14763 4024c0 ___crtInitCritSecAndSpinCount 14763->14728 14766 404045 ___crtInitCritSecAndSpinCount 14764->14766 14765 4040be ___crtInitCritSecAndSpinCount _realloc 14765->14729 14766->14765 14768 402d12 __lock 59 API calls 14766->14768 14776 404084 14766->14776 14767 404099 HeapFree 14767->14765 14769 4040ab 14767->14769 14773 40405c ___sbh_find_block 14768->14773 14770 402ea8 _malloc 59 API calls 14769->14770 14771 4040b0 GetLastError 14770->14771 14771->14765 14772 404076 14942 40408f 14772->14942 14773->14772 14936 404911 14773->14936 14776->14765 14776->14767 14778 405e2c ___crtInitCritSecAndSpinCount 14777->14778 14779 405e44 14778->14779 14789 405e63 _abort 14778->14789 14780 402ea8 _malloc 60 API calls 14779->14780 14781 405e49 14780->14781 14782 402e49 _strcat_s 60 API calls 14781->14782 14786 405e59 ___crtInitCritSecAndSpinCount 14782->14786 14783 405ed5 HeapAlloc 14783->14789 14786->14737 14789->14783 14789->14786 14790 402d12 14789->14790 14797 4050ba 14789->14797 14803 405f1c 14789->14803 14806 403452 14789->14806 14791 402d25 14790->14791 14792 402d38 EnterCriticalSection 14790->14792 14809 402c4f 14791->14809 14792->14789 14794 402d2b 14794->14792 14795 401499 __amsg_exit 60 API calls 14794->14795 14796 402d37 14795->14796 14796->14792 14798 4050e6 14797->14798 14799 40517f 14798->14799 14802 405188 14798->14802 14902 404c25 14798->14902 14799->14802 14909 404cd5 14799->14909 14802->14789 14913 402c3a LeaveCriticalSection 14803->14913 14805 405f23 14805->14789 14807 40232a ___crtInitCritSecAndSpinCount 61 API calls 14806->14807 14808 40345d 14807->14808 14808->14789 14810 402c5b ___crtInitCritSecAndSpinCount 14809->14810 14811 402c81 14810->14811 14835 401955 14810->14835 14819 402c91 ___crtInitCritSecAndSpinCount 14811->14819 14881 4040c7 14811->14881 14817 402cb2 14822 402d12 __lock 61 API calls 14817->14822 14818 402ca3 14821 402ea8 _malloc 61 API calls 14818->14821 14819->14794 14821->14819 14824 402cb9 14822->14824 14825 402cc1 14824->14825 14826 402ced 14824->14826 14886 403383 14825->14886 14827 404039 __setenvp 61 API calls 14826->14827 14829 402cde 14827->14829 14899 402d09 14829->14899 14830 402ccc 14830->14829 14832 404039 __setenvp 61 API calls 14830->14832 14833 402cd8 14832->14833 14834 402ea8 _malloc 61 API calls 14833->14834 14834->14829 14836 403850 __FF_MSGBANNER 61 API calls 14835->14836 14837 40195c 14836->14837 14838 401969 14837->14838 14840 403850 __FF_MSGBANNER 61 API calls 14837->14840 14839 4017b5 _abort 61 API calls 14838->14839 14843 40198b 14838->14843 14841 401981 14839->14841 14840->14838 14842 4017b5 _abort 61 API calls 14841->14842 14842->14843 14844 4017b5 14843->14844 14845 4017c1 14844->14845 14846 403850 __FF_MSGBANNER 58 API calls 14845->14846 14876 401917 14845->14876 14847 4017e1 14846->14847 14848 40191c GetStdHandle 14847->14848 14850 403850 __FF_MSGBANNER 58 API calls 14847->14850 14849 40192a _strlen 14848->14849 14848->14876 14853 401944 WriteFile 14849->14853 14849->14876 14851 4017f2 14850->14851 14851->14848 14852 401804 14851->14852 14854 4037eb _strcpy_s 58 API calls 14852->14854 14852->14876 14853->14876 14855 401826 14854->14855 14856 40183a GetModuleFileNameA 14855->14856 14858 402d4d __invoke_watson 5 API calls 14855->14858 14857 401858 14856->14857 14863 40187b _strlen 14856->14863 14860 4037eb _strcpy_s 58 API calls 14857->14860 14859 401837 14858->14859 14859->14856 14861 401868 14860->14861 14861->14863 14864 402d4d __invoke_watson 5 API calls 14861->14864 14862 4018be 14865 403631 _strcat_s 58 API calls 14862->14865 14863->14862 14867 4036a2 _abort 58 API calls 14863->14867 14864->14863 14866 4018d1 14865->14866 14868 4018e2 14866->14868 14870 402d4d __invoke_watson 5 API calls 14866->14870 14869 4018ab 14867->14869 14871 403631 _strcat_s 58 API calls 14868->14871 14869->14862 14872 402d4d __invoke_watson 5 API calls 14869->14872 14870->14868 14873 4018f3 14871->14873 14872->14862 14875 402d4d __invoke_watson 5 API calls 14873->14875 14877 401904 14873->14877 14874 403474 _abort 58 API calls 14874->14876 14875->14877 14878 4014e3 14876->14878 14877->14874 14879 4014bd ___crtCorExitProcess GetModuleHandleA GetProcAddress 14878->14879 14880 4014ec ExitProcess 14879->14880 14884 4040cb 14881->14884 14882 405d5d _malloc 60 API calls 14882->14884 14883 402c9c 14883->14817 14883->14818 14884->14882 14884->14883 14885 4040e3 Sleep 14884->14885 14885->14884 14887 40338f ___crtInitCritSecAndSpinCount 14886->14887 14888 40232a ___crtInitCritSecAndSpinCount 59 API calls 14887->14888 14889 40339f 14888->14889 14890 401542 ___crtInitCritSecAndSpinCount 59 API calls 14889->14890 14893 4033f3 ___crtInitCritSecAndSpinCount 14889->14893 14891 4033af 14890->14891 14892 4033be 14891->14892 14894 402d4d __invoke_watson 5 API calls 14891->14894 14895 4033c7 GetModuleHandleA 14892->14895 14896 4033e8 14892->14896 14893->14830 14894->14892 14895->14896 14897 4033d6 GetProcAddress 14895->14897 14898 4022b3 ___crtInitCritSecAndSpinCount 59 API calls 14896->14898 14897->14896 14898->14893 14900 402c3a __calloc_impl LeaveCriticalSection 14899->14900 14901 402d10 14900->14901 14901->14819 14903 404c38 HeapReAlloc 14902->14903 14904 404c6c HeapAlloc 14902->14904 14905 404c5a 14903->14905 14907 404c56 14903->14907 14906 404c8f VirtualAlloc 14904->14906 14904->14907 14905->14904 14906->14907 14908 404ca9 HeapFree 14906->14908 14907->14799 14908->14907 14910 404cea VirtualAlloc 14909->14910 14912 404d31 14910->14912 14912->14802 14913->14805 14915 401579 ___crtInitCritSecAndSpinCount 60 API calls 14914->14915 14916 402262 14915->14916 14917 402269 ___crtInitCritSecAndSpinCount 14916->14917 14918 40226d GetModuleHandleA 14916->14918 14917->14747 14918->14917 14919->14752 14921 4046f3 InterlockedIncrement 14920->14921 14922 4046f6 14920->14922 14921->14922 14923 404700 InterlockedIncrement 14922->14923 14924 404703 14922->14924 14923->14924 14925 404710 14924->14925 14926 40470d InterlockedIncrement 14924->14926 14927 40471a InterlockedIncrement 14925->14927 14929 40471d 14925->14929 14926->14925 14927->14929 14928 404732 InterlockedIncrement 14928->14929 14929->14928 14930 404742 InterlockedIncrement 14929->14930 14931 40474b InterlockedIncrement 14929->14931 14930->14929 14931->14761 14935 402c3a LeaveCriticalSection 14932->14935 14934 4024cd 14934->14763 14935->14934 14937 40494e 14936->14937 14941 404bf0 ___sbh_free_block 14936->14941 14938 404b3a VirtualFree 14937->14938 14937->14941 14939 404b9e 14938->14939 14940 404bad VirtualFree HeapFree 14939->14940 14939->14941 14940->14941 14941->14772 14945 402c3a LeaveCriticalSection 14942->14945 14944 404096 14944->14776 14945->14944 14947 4055fc __VEC_memzero 14946->14947 14947->14699 14948->14540 14950 4041b8 14949->14950 14951 4041df __VEC_memcpy 14950->14951 14952 401f98 FreeEnvironmentStringsA 14950->14952 14951->14952 14952->14561 14954 404024 14953->14954 14955 40402b 14953->14955 14966 403e81 14954->14966 14955->14582 14958 403800 14957->14958 14959 4037f8 14957->14959 14960 402ea8 _malloc 61 API calls 14958->14960 14959->14958 14964 403827 14959->14964 14961 403805 14960->14961 14962 402e49 _strcat_s 61 API calls 14961->14962 14963 403814 14962->14963 14963->14591 14964->14963 14965 402ea8 _malloc 61 API calls 14964->14965 14965->14961 14967 403e8d ___crtInitCritSecAndSpinCount 14966->14967 14997 402546 14967->14997 14971 403ea0 15018 403c2e 14971->15018 14974 4040c7 __malloc_crt 61 API calls 14975 403ec1 14974->14975 14976 403fe0 ___crtInitCritSecAndSpinCount 14975->14976 15025 403ca8 14975->15025 14976->14955 14978 403ee4 14979 403ef1 InterlockedDecrement 14978->14979 14980 403fed 14978->14980 14981 403f01 14979->14981 14982 403f12 InterlockedIncrement 14979->14982 14980->14976 14984 404000 14980->14984 14987 404039 __setenvp 61 API calls 14980->14987 14981->14982 14986 404039 __setenvp 61 API calls 14981->14986 14982->14976 14983 403f28 14982->14983 14983->14976 14989 402d12 __lock 61 API calls 14983->14989 14985 402ea8 _malloc 61 API calls 14984->14985 14985->14976 14988 403f11 14986->14988 14987->14984 14988->14982 14991 403f3c InterlockedDecrement 14989->14991 14992 403fb8 14991->14992 14993 403fcb InterlockedIncrement 14991->14993 14992->14993 14995 404039 __setenvp 61 API calls 14992->14995 15033 403fe2 14993->15033 14996 403fca 14995->14996 14996->14993 14998 4024cf _raise 61 API calls 14997->14998 14999 40254c 14998->14999 15000 402559 14999->15000 15001 401499 __amsg_exit 61 API calls 14999->15001 15002 403b8a 15000->15002 15001->15000 15003 403b96 ___crtInitCritSecAndSpinCount 15002->15003 15004 402546 _LocaleUpdate::_LocaleUpdate 61 API calls 15003->15004 15005 403b9b 15004->15005 15006 402d12 __lock 61 API calls 15005->15006 15007 403bad 15005->15007 15008 403bcb 15006->15008 15010 403bbb ___crtInitCritSecAndSpinCount 15007->15010 15014 401499 __amsg_exit 61 API calls 15007->15014 15009 403c14 15008->15009 15011 403be2 InterlockedDecrement 15008->15011 15012 403bfc InterlockedIncrement 15008->15012 15036 403c25 15009->15036 15010->14971 15011->15012 15015 403bed 15011->15015 15012->15009 15014->15010 15015->15012 15016 404039 __setenvp 61 API calls 15015->15016 15017 403bfb 15016->15017 15017->15012 15040 403896 15018->15040 15021 403c69 15023 403c6e GetACP 15021->15023 15024 403c5b 15021->15024 15022 403c4b GetOEMCP 15022->15024 15023->15024 15024->14974 15024->14976 15026 403c2e getSystemCP 73 API calls 15025->15026 15027 403cc6 15026->15027 15028 403d3a _abort __setmbcp 15027->15028 15029 403cd1 setSBCS __except_handler4 15027->15029 15030 403d15 IsValidCodePage 15027->15030 15231 403a00 GetCPInfo 15028->15231 15029->14978 15030->15029 15031 403d27 GetCPInfo 15030->15031 15031->15028 15031->15029 15383 402c3a LeaveCriticalSection 15033->15383 15035 403fe9 15035->14976 15039 402c3a LeaveCriticalSection 15036->15039 15038 403c2c 15038->15007 15039->15038 15041 4038a5 15040->15041 15045 4038f2 15040->15045 15042 402546 _LocaleUpdate::_LocaleUpdate 61 API calls 15041->15042 15043 4038aa 15042->15043 15044 4038d2 15043->15044 15048 404828 15043->15048 15044->15045 15047 403b8a _LocaleUpdate::_LocaleUpdate 63 API calls 15044->15047 15045->15021 15045->15022 15047->15045 15049 404834 ___crtInitCritSecAndSpinCount 15048->15049 15050 402546 _LocaleUpdate::_LocaleUpdate 61 API calls 15049->15050 15051 404839 15050->15051 15052 404867 15051->15052 15054 40484b 15051->15054 15053 402d12 __lock 61 API calls 15052->15053 15055 40486e 15053->15055 15056 402546 _LocaleUpdate::_LocaleUpdate 61 API calls 15054->15056 15063 4047ea 15055->15063 15058 404850 15056->15058 15061 40485e ___crtInitCritSecAndSpinCount 15058->15061 15062 401499 __amsg_exit 61 API calls 15058->15062 15061->15044 15062->15061 15064 4047ee 15063->15064 15070 404820 15063->15070 15065 4046d8 ___addlocaleref 8 API calls 15064->15065 15064->15070 15066 404801 15065->15066 15066->15070 15074 40475e 15066->15074 15071 404892 15070->15071 15230 402c3a LeaveCriticalSection 15071->15230 15073 404899 15073->15058 15075 4047e6 15074->15075 15076 404767 InterlockedDecrement 15074->15076 15075->15070 15088 404598 15075->15088 15077 404780 15076->15077 15078 40477d InterlockedDecrement 15076->15078 15079 40478a InterlockedDecrement 15077->15079 15080 40478d 15077->15080 15078->15077 15079->15080 15081 404797 InterlockedDecrement 15080->15081 15082 40479a 15080->15082 15081->15082 15083 4047a4 InterlockedDecrement 15082->15083 15085 4047a7 15082->15085 15083->15085 15084 4047bc InterlockedDecrement 15084->15085 15085->15084 15086 4047cc InterlockedDecrement 15085->15086 15087 4047d5 InterlockedDecrement 15085->15087 15086->15085 15087->15075 15089 404619 15088->15089 15091 4045ac 15088->15091 15090 404039 __setenvp 61 API calls 15089->15090 15092 404666 15089->15092 15093 40463a 15090->15093 15091->15089 15098 4045e0 15091->15098 15101 404039 __setenvp 61 API calls 15091->15101 15111 40468d 15092->15111 15142 4062d7 15092->15142 15095 404039 __setenvp 61 API calls 15093->15095 15104 404039 __setenvp 61 API calls 15098->15104 15117 404601 15098->15117 15099 404039 __setenvp 61 API calls 15100 4046cc 15107 4045d5 15101->15107 15102 404039 __setenvp 61 API calls 15102->15111 15112 4045f6 15104->15112 15118 4064a7 15107->15118 15111->15100 15113 404039 61 API calls __setenvp 15111->15113 15134 406467 15112->15134 15113->15111 15117->15099 15119 4064b0 15118->15119 15133 40652d 15118->15133 15133->15098 15143 4062e4 15142->15143 15144 404686 15142->15144 15145 404039 __setenvp 61 API calls 15143->15145 15144->15102 15230->15073 15232 403a37 _abort 15231->15232 15238 403ae0 __except_handler4 15231->15238 15239 405cce 15232->15239 15238->15028 15240 403896 _LocaleUpdate::_LocaleUpdate 71 API calls 15239->15240 15241 405cdf 15240->15241 15249 405b16 15241->15249 15243 403a9b 15244 405ad3 15243->15244 15245 403896 _LocaleUpdate::_LocaleUpdate 71 API calls 15244->15245 15246 405ae4 15245->15246 15250 405b35 GetStringTypeW 15249->15250 15251 405b60 15249->15251 15252 405b55 GetLastError 15250->15252 15253 405b4d 15250->15253 15251->15253 15254 405c47 15251->15254 15252->15251 15255 405b99 MultiByteToWideChar 15253->15255 15258 405c41 __except_handler4 15253->15258 15293 406c2c GetLocaleInfoA 15254->15293 15255->15258 15261 405bc6 15255->15261 15257 405c6b 15257->15258 15259 405c98 GetStringTypeA 15257->15259 15297 406c73 15257->15297 15258->15243 15259->15258 15260 405bdb _abort __alloca_probe_16 15260->15258 15263 405c14 MultiByteToWideChar 15260->15263 15261->15260 15271 405d5d 15261->15271 15272 405e0a 15271->15272 15283 405d6b 15271->15283 15273 403452 _malloc 60 API calls 15272->15273 15280 405dce HeapAlloc 15280->15283 15281 4014e3 _malloc 3 API calls 15281->15283 15282 405e01 15282->15260 15283->15280 15283->15281 15283->15282 15284 405df5 15283->15284 15294 406c5d 15293->15294 15295 406c58 __except_handler4 15293->15295 15331 406f18 15294->15331 15295->15257 15298 406cb1 GetCPInfo 15297->15298 15301 406d3b __except_handler4 15297->15301 15334 407186 15331->15334 15335 40719d 15334->15335 15383->15035 15385 402ff5 15384->15385 15387 40300d 15385->15387 15391 4022b3 TlsGetValue 15385->15391 15387->14596 15401 402fa3 15388->15401 15390 402fe8 15390->14598 15392 4022c6 15391->15392 15393 4022e7 GetModuleHandleA 15391->15393 15392->15393 15395 4022d0 TlsGetValue 15392->15395 15394 4022f8 15393->15394 15400 4022df 15393->15400 15396 402247 ___crtInitCritSecAndSpinCount 57 API calls 15394->15396 15398 4022db 15395->15398 15397 4022fd 15396->15397 15399 402301 GetProcAddress 15397->15399 15397->15400 15398->15393 15398->15400 15399->15400 15400->15385 15402 402faf ___crtInitCritSecAndSpinCount 15401->15402 15409 4014f8 15402->15409 15408 402fd0 ___crtInitCritSecAndSpinCount 15408->15390 15410 402d12 __lock 61 API calls 15409->15410 15411 4014ff 15410->15411 15412 402ebb 15411->15412 15413 40232a ___crtInitCritSecAndSpinCount 61 API calls 15412->15413 15414 402ecb 15413->15414 15415 40232a ___crtInitCritSecAndSpinCount 61 API calls 15414->15415 15416 402edc 15415->15416 15417 402f5f 15416->15417 15432 40566a 15416->15432 15429 402fd9 15417->15429 15419 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 15420 402f54 15419->15420 15423 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 15420->15423 15421 402f1c 15421->15417 15425 40414f __realloc_crt 68 API calls 15421->15425 15426 402f33 15421->15426 15422 402efa 15422->15421 15428 402f45 15422->15428 15445 40414f 15422->15445 15423->15417 15425->15426 15426->15417 15427 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 15426->15427 15427->15428 15428->15419 15495 401501 15429->15495 15433 405676 ___crtInitCritSecAndSpinCount 15432->15433 15434 4056a3 15433->15434 15435 405686 15433->15435 15437 4056e4 HeapSize 15434->15437 15439 402d12 __lock 61 API calls 15434->15439 15436 402ea8 _malloc 61 API calls 15435->15436 15438 40568b 15436->15438 15441 40569b ___crtInitCritSecAndSpinCount 15437->15441 15440 402e49 _strcat_s 61 API calls 15438->15440 15442 4056b3 ___sbh_find_block 15439->15442 15440->15441 15441->15422 15450 405704 15442->15450 15449 404153 15445->15449 15447 404195 15447->15421 15448 404176 Sleep 15448->15449 15449->15447 15449->15448 15454 405f3e 15449->15454 15453 402c3a LeaveCriticalSection 15450->15453 15452 4056df 15452->15437 15452->15441 15453->15452 15455 405f4a ___crtInitCritSecAndSpinCount 15454->15455 15456 405f51 15455->15456 15457 405f5f 15455->15457 15458 405d5d _malloc 61 API calls 15456->15458 15459 405f72 15457->15459 15460 405f66 15457->15460 15462 405f59 ___crtInitCritSecAndSpinCount _realloc 15458->15462 15467 4060e4 15459->15467 15469 405f7f ___sbh_resize_block ___sbh_find_block 15459->15469 15461 404039 __setenvp 61 API calls 15460->15461 15461->15462 15462->15449 15463 406117 15465 403452 _malloc 61 API calls 15463->15465 15464 4060e9 HeapReAlloc 15464->15462 15464->15467 15468 40611d 15465->15468 15466 402d12 __lock 61 API calls 15466->15469 15467->15463 15467->15464 15470 40613b 15467->15470 15472 403452 _malloc 61 API calls 15467->15472 15474 406131 15467->15474 15471 402ea8 _malloc 61 API calls 15468->15471 15469->15462 15469->15463 15469->15466 15478 40600a HeapAlloc 15469->15478 15479 40605f HeapReAlloc 15469->15479 15481 4050ba ___sbh_alloc_block 5 API calls 15469->15481 15482 4060ca 15469->15482 15483 403452 _malloc 61 API calls 15469->15483 15486 4060ad 15469->15486 15487 4041a0 __VEC_memcpy ___crtGetEnvironmentStringsA 15469->15487 15490 404911 VirtualFree VirtualFree HeapFree ___sbh_free_block 15469->15490 15491 406082 15469->15491 15470->15462 15473 402ea8 _malloc 61 API calls 15470->15473 15471->15462 15472->15467 15475 406144 GetLastError 15473->15475 15477 402ea8 _malloc 61 API calls 15474->15477 15475->15462 15489 4060b2 15477->15489 15478->15469 15479->15469 15480 4060b7 GetLastError 15480->15462 15481->15469 15482->15462 15484 402ea8 _malloc 61 API calls 15482->15484 15483->15469 15485 4060d7 15484->15485 15485->15462 15485->15475 15488 402ea8 _malloc 61 API calls 15486->15488 15487->15469 15488->15489 15489->15462 15489->15480 15490->15469 15494 402c3a LeaveCriticalSection 15491->15494 15493 406089 15493->15469 15494->15493 15498 402c3a LeaveCriticalSection 15495->15498 15497 401508 15497->15408 15498->15497 15502 403918 15499->15502 15503 403896 _LocaleUpdate::_LocaleUpdate 71 API calls 15502->15503 15504 403929 15503->15504 15504->14603 15506 40103a 15505->15506 15508 401008 15505->15508 15506->14607 15507 401031 CharNextA 15507->15506 15507->15508 15508->15506 15508->15507 15509 40102a CharNextA 15508->15509 15510 40103f CharNextA 15508->15510 15509->15507 15509->15508 15510->14607 15512 401653 ___crtInitCritSecAndSpinCount 15511->15512 15513 402d12 __lock 61 API calls 15512->15513 15514 40165a 15513->15514 15515 4016d9 _abort 15514->15515 15516 40167e 15514->15516 15530 401714 15515->15530 15518 40232a ___crtInitCritSecAndSpinCount 61 API calls 15516->15518 15520 401689 15518->15520 15522 40232a ___crtInitCritSecAndSpinCount 61 API calls 15520->15522 15521 401711 ___crtInitCritSecAndSpinCount 15521->14616 15527 401697 15522->15527 15524 401708 15526 4014e3 _malloc 3 API calls 15524->15526 15525 4016c9 _abort 15525->15515 15526->15521 15527->15525 15529 40232a ___crtInitCritSecAndSpinCount 61 API calls 15527->15529 15535 402321 15527->15535 15529->15527 15531 40171a 15530->15531 15533 4016f5 15530->15533 15538 402c3a LeaveCriticalSection 15531->15538 15533->15521 15534 402c3a LeaveCriticalSection 15533->15534 15534->15524 15536 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 15535->15536 15537 402328 15536->15537 15537->15527 15538->15533 15540 4023e9 15539->15540 15541 4023dd 15539->15541 15543 4023fd TlsFree 15540->15543 15544 40240b 15540->15544 15542 40232a ___crtInitCritSecAndSpinCount 61 API calls 15541->15542 15542->15540 15543->15544 15545 402bff DeleteCriticalSection 15544->15545 15546 402c17 15544->15546 15547 404039 __setenvp 61 API calls 15545->15547 15548 402c29 DeleteCriticalSection 15546->15548 15549 402696 15546->15549 15547->15544 15548->15546 15549->14487 15551 402321 __init_pointers 61 API calls 15550->15551 15552 40176f __init_pointers 15551->15552 15561 402b8b 15552->15561 15555 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 15556 4017ab 15555->15556 15556->14637 15558 402ba5 15557->15558 15559 403383 ___crtInitCritSecAndSpinCount 61 API calls 15558->15559 15560 402790 15558->15560 15559->15558 15560->14647 15560->14648 15562 4022b3 ___crtInitCritSecAndSpinCount 61 API calls 15561->15562 15563 4017a1 15562->15563 15563->15555 15566 401c42 15564->15566 15565 403969 _parse_cmdline 71 API calls 15565->15566 15566->15565 15568 401caf 15566->15568 15567 401dad 15567->14671 15567->14673 15568->15567 15569 403969 71 API calls _parse_cmdline 15568->15569 15569->15568

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 100134BE
                                                                                                                                                                                                                              • OpenServiceA.ADVAPI32(00000000,?,00010000), ref: 100134D1
                                                                                                                                                                                                                              • DeleteService.ADVAPI32(00000000), ref: 100134DE
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 100134E4
                                                                                                                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 100134ED
                                                                                                                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 100134F6
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 100134FE
                                                                                                                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10013507
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 1001350F
                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000), ref: 10013518
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Service$ErrorLast$CloseHandle$Open$DeleteManager
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2479149357-0
                                                                                                                                                                                                                              • Opcode ID: 0b951e9cdb1a0b26f3be69c1878f1c2782ce42dc9d03292b26ecafa066a6cc1a
                                                                                                                                                                                                                              • Instruction ID: 46c2e6c5a61eedaf3fef038684788d392a8c372027cf2a0885eba6b60b5d160f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b951e9cdb1a0b26f3be69c1878f1c2782ce42dc9d03292b26ecafa066a6cc1a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9F01F132641624AFE7126BF49C8DB5E3B68EF49F42F058130FB01DA161DAB1E84086B1

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __snprintf.LIBCMT ref: 10012F6E
                                                                                                                                                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00000003,?,?,?,?,?), ref: 10012F89
                                                                                                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,Tag,00000000,?,00000001,?), ref: 10012FD4
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 10012FFA
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseOpenQueryValue__snprintf
                                                                                                                                                                                                                              • String ID: SYSTEM\CurrentControlSet\Services\%s$Tag$Tag
                                                                                                                                                                                                                              • API String ID: 906094135-167878906
                                                                                                                                                                                                                              • Opcode ID: 6f56ef87285fea69d5a8c9f690d12e05e358ab22d85251f7a7e5ed3c1616b0d0
                                                                                                                                                                                                                              • Instruction ID: f9c08eb89e650521aaf22d2235fa5d9325a6f599f2f4c571dbf36a9dd9bf478e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6f56ef87285fea69d5a8c9f690d12e05e358ab22d85251f7a7e5ed3c1616b0d0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 33116DB1A04354AFE328CB64CC4AFEB77E8EB89B40F40481CB74D9A180E774D945C7A2

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters,00000000,00000003,?,?,?,10013525,00000000), ref: 10012D86
                                                                                                                                                                                                                              • RegQueryValueExA.KERNELBASE ref: 10012DB9
                                                                                                                                                                                                                              • RegSetValueExA.KERNELBASE(?,DisabledComponents,00000000,00000004,?,00000004,?), ref: 10012DF7
                                                                                                                                                                                                                              • RegCloseKey.KERNELBASE(?), ref: 10012E04
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • DisabledComponents, xrefs: 10012DF1
                                                                                                                                                                                                                              • DisabledComponents, xrefs: 10012DAB
                                                                                                                                                                                                                              • SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters, xrefs: 10012D7C
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$CloseOpenQuery
                                                                                                                                                                                                                              • String ID: DisabledComponents$DisabledComponents$SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters
                                                                                                                                                                                                                              • API String ID: 237177642-4216016250
                                                                                                                                                                                                                              • Opcode ID: e76360cbcc9baf098a5e93c68d2a24a7b395f91ed9355a7129efde6212d0d687
                                                                                                                                                                                                                              • Instruction ID: 9ee4d2c3e57a7063b565cc8fc060191f73725880ea3dbb34ca1c1c45c67cef35
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e76360cbcc9baf098a5e93c68d2a24a7b395f91ed9355a7129efde6212d0d687
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7911A0B5508312BFE710DB54DD44FAB7BE8EB88B44F41890CF6899A0D0E374C984C756

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Services\Tcpip\Parameters,00000000,00000002,00000000,00000000,00000000), ref: 10012D15
                                                                                                                                                                                                                              • RegSetValueExA.KERNELBASE(00000000,DisableTaskOffload,00000000,00000004,?,00000004,?), ref: 10012D47
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 10012D54
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • DisableTaskOffload, xrefs: 10012D3D
                                                                                                                                                                                                                              • SYSTEM\CurrentControlSet\Services\Tcpip\Parameters, xrefs: 10012D0B
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseOpenValue
                                                                                                                                                                                                                              • String ID: DisableTaskOffload$SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
                                                                                                                                                                                                                              • API String ID: 779948276-1474643600
                                                                                                                                                                                                                              • Opcode ID: b914e9072d492bfd31763df8d8490f62f2f2385f3a95968ca031b7c0720cf9be
                                                                                                                                                                                                                              • Instruction ID: 2230c34db065372bc40d34239641de211e9b25fb5ab268f73dea6e655c247ba9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b914e9072d492bfd31763df8d8490f62f2f2385f3a95968ca031b7c0720cf9be
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BBF0E9716043207FE711EB209C4AF5B37E8AB8CB00F84891CF794DA180E370C958C796

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 36 401000-401006 37 401008-40100e 36->37 38 40103a-40103e 36->38 39 401010-401013 37->39 39->38 40 401015-401019 39->40 41 401031-401038 CharNextA 40->41 42 40101b 40->42 41->38 41->39 43 401020-401024 42->43 43->41 44 401026-401028 43->44 45 40102a-40102f CharNextA 44->45 46 40103f-401044 CharNextA 44->46 45->41 45->43
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CharNext
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3213498283-0
                                                                                                                                                                                                                              • Opcode ID: 7c522331cf8c48b44b5ec6a2051b80fc459d173407debce357d97d96f401c9b2
                                                                                                                                                                                                                              • Instruction ID: dde81b71a90f9f684eae9ae77c255fe350d7d91c01edff3817fbd5cfc17a4160
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7c522331cf8c48b44b5ec6a2051b80fc459d173407debce357d97d96f401c9b2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3BE06522A056E216D732162D28107AB568C4FD57E071A457BE8C0F77A5D639CCC642DD

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,10008AA9,00000001,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608,0000000C), ref: 100092E0
                                                                                                                                                                                                                              • HeapDestroy.KERNEL32(?,?,00000001,?,?,10008C27,00000001,?,?,1001B608,0000000C,10008CE1,?), ref: 10009316
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Heap$CreateDestroy
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3296620671-0
                                                                                                                                                                                                                              • Opcode ID: 564c51fca60af66e7a4a00761b05f1ec1e784a5b92eab29dc0ead7a71cea7728
                                                                                                                                                                                                                              • Instruction ID: 0c4cb1e0f78fd55b04bfad504b74cc3b14dfc1a1f94936553e122905dbeb7e21
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 564c51fca60af66e7a4a00761b05f1ec1e784a5b92eab29dc0ead7a71cea7728
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3CE01279654362AEFB41DB308C8976A35E8E7547C6F10C939F415C50B8FBB0C6809A04

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 47 40285e-40287c HeapCreate 48 402881-40288e call 402803 47->48 49 40287e-402880 47->49 52 402890-40289d call 40489e 48->52 53 4028b4-4028b7 48->53 52->53 56 40289f-4028b2 HeapDestroy 52->56 56->49
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,00401236,00000001), ref: 0040286F
                                                                                                                                                                                                                              • HeapDestroy.KERNEL32 ref: 004028A5
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Heap$CreateDestroy
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3296620671-0
                                                                                                                                                                                                                              • Opcode ID: 6a61f211992a6e18c95607d49fad3f3b072efb0b2f059ec0a30deba2ad50305b
                                                                                                                                                                                                                              • Instruction ID: c9b1d8ae43914fce643a3b0feff7cc958f3d34f8e715b1d91c1e9ab3a3c39313
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6a61f211992a6e18c95607d49fad3f3b072efb0b2f059ec0a30deba2ad50305b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ABE06576550301DAEB457B715F0DB363594E74074AF10853BF841F51E2FBB88540960D

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 67 4014e3-4014f1 call 4014bd ExitProcess
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • ___crtCorExitProcess.LIBCMT ref: 004014E7
                                                                                                                                                                                                                                • Part of subcall function 004014BD: GetModuleHandleA.KERNEL32(mscoree.dll,004014EC,?,00405D96,000000FF,0000001E,00000001,00000000,00000000,?,004040D4,?,00000001,?,00402C9C,00000018), ref: 004014C2
                                                                                                                                                                                                                                • Part of subcall function 004014BD: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004014D2
                                                                                                                                                                                                                              • ExitProcess.KERNEL32 ref: 004014F1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2427264223-0
                                                                                                                                                                                                                              • Opcode ID: 6c26d35538560624cb0276524913e3c26102e8c22ac44d2ad5d5b3d3ea4d6717
                                                                                                                                                                                                                              • Instruction ID: 537dee8b853bd8b800ce6c4827e120e5e31ff7b11606db799f1f5586ed61abf1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c26d35538560624cb0276524913e3c26102e8c22ac44d2ad5d5b3d3ea4d6717
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EBB01230004100AFC6012B10EF0BC0D7B71EF40744F00C47DF088100708F354C54BE05
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 100135C3
                                                                                                                                                                                                                              • CreateServiceW.ADVAPI32(00000000,?,?,000F01FF,00000001,00000001,00000001,?,PNP_TDI,?,00000000,00000000,00000000), ref: 10013605
                                                                                                                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 1001361B
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 10013625
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 1001363D
                                                                                                                                                                                                                              • OpenServiceA.ADVAPI32(?,?,00000014), ref: 10013655
                                                                                                                                                                                                                              • QueryServiceStatus.ADVAPI32(00000000,?), ref: 10013667
                                                                                                                                                                                                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 1001367D
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 10013689
                                                                                                                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10013692
                                                                                                                                                                                                                              • CloseServiceHandle.ADVAPI32(?), ref: 100136A7
                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000), ref: 100136B9
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Service$ErrorLast$CloseHandle$Open$CreateManagerQueryStartStatus
                                                                                                                                                                                                                              • String ID: %S\%S.sys$PNP_TDI$system32\drivers\%S.sys
                                                                                                                                                                                                                              • API String ID: 3292902256-1894622794
                                                                                                                                                                                                                              • Opcode ID: 660a23612fc86a23e892aea1473c593627136715394c5b516177490ee6cba120
                                                                                                                                                                                                                              • Instruction ID: 3a4aafa71a6d85f3e9df812c39c39bfa152d82fe410905c2edde1af795798740
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 660a23612fc86a23e892aea1473c593627136715394c5b516177490ee6cba120
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1841E172644310BFE321DB608C89FAB77E9EB89B40F01851CFB859B291DA71E9408766
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 100020EF
                                                                                                                                                                                                                              • __aullrem.LIBCMT ref: 10002114
                                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 1000215A
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10002199
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100021AE
                                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 10002256
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10002295
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100022AA
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 1000239F
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 100023FE
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10002498
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100024AD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10002563
                                                                                                                                                                                                                                • Part of subcall function 10014ED0: EnterCriticalSection.KERNEL32(10020324,?,?,?,?,?,?,?,?,?,1001536D), ref: 10014F3F
                                                                                                                                                                                                                                • Part of subcall function 10014ED0: WriteFile.KERNEL32(FFFFFFFF,?,00000008,00000000,?), ref: 10014F8F
                                                                                                                                                                                                                                • Part of subcall function 10014ED0: GetLastError.KERNEL32 ref: 10014F99
                                                                                                                                                                                                                                • Part of subcall function 10014ED0: LeaveCriticalSection.KERNEL32(10020324), ref: 10014FAB
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Enter$Leave$CountTick$ErrorFileLastWrite__aullrem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2584342812-0
                                                                                                                                                                                                                              • Opcode ID: af9e0746b45dabf02fd2421baf30e015d80efef54aadf8bda24db42c6145cc84
                                                                                                                                                                                                                              • Instruction ID: 27e7611ef1cc4cd64037de96806a1b775dfd5a4704548cb2295c2b271f4c6af1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: af9e0746b45dabf02fd2421baf30e015d80efef54aadf8bda24db42c6145cc84
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F8F19A74604742EFE310CF64C984A4AB7F6FF48784F418929E9499BA15E330FD95CBA2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 100139D4
                                                                                                                                                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 100139E2
                                                                                                                                                                                                                              • OpenProcessToken.ADVAPI32(00000000,00000020,?), ref: 100139F7
                                                                                                                                                                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 10013A13
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 10013A22
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10013A25
                                                                                                                                                                                                                              • AdjustTokenPrivileges.ADVAPI32 ref: 10013A5F
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 10013A74
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10013A77
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseHandle$Process$OpenToken$AdjustCurrentLookupPrivilegePrivilegesValue
                                                                                                                                                                                                                              • String ID: SeDebugPrivilege
                                                                                                                                                                                                                              • API String ID: 2638893802-2896544425
                                                                                                                                                                                                                              • Opcode ID: 419289fe1aa8360b2f1914424ecfbc0142881d51788569709d273a4057b6a3c7
                                                                                                                                                                                                                              • Instruction ID: 0388be8fc12d26e35ffcfca9aa46a7d98fc754c634c7c292c2151c31a72acd32
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 419289fe1aa8360b2f1914424ecfbc0142881d51788569709d273a4057b6a3c7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 58116A75604310AFE201EB68CC89FAF7BE8EFC8754F44841CFA8896291D770E5448BA6
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetLogicalDriveStringsW.KERNEL32(00000104,?,DF9D727A,?,?,?,00000000), ref: 1001640D
                                                                                                                                                                                                                              • QueryDosDeviceW.KERNEL32 ref: 1001646C
                                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?,?,?,?,?,?), ref: 100165A1
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020484), ref: 10016726
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020484), ref: 10016742
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalDriveSection$DeviceEnterLeaveLogicalQueryStringsType
                                                                                                                                                                                                                              • String ID: :
                                                                                                                                                                                                                              • API String ID: 3137785116-336475711
                                                                                                                                                                                                                              • Opcode ID: 309e0b93bcea4dd87cd4e26c409c77e7e666b1aaa0db519f1e08522f54eca9c8
                                                                                                                                                                                                                              • Instruction ID: 05aef7f753930580f9efe3ccf0e9bc9ed64d96a84334a073f7ef42401ff9f03d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 309e0b93bcea4dd87cd4e26c409c77e7e666b1aaa0db519f1e08522f54eca9c8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ADA15AB15083818BE720CF64CC85B9BB7E5FF88344F448A1EE6898B251D770E688CB53
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00401000: CharNextA.USER32 ref: 0040102B
                                                                                                                                                                                                                                • Part of subcall function 00401000: CharNextA.USER32 ref: 00401032
                                                                                                                                                                                                                              • MessageBoxA.USER32(00000000,Usage: nfregdrv.exe <driver_name> - register windows\system32\drivers\<driver_name>.sys nfregdrv.exe -u <driver_name> - unregister windows\system32\drivers\<driver_name>.sys,nfregdvr,00000000), ref: 004010AE
                                                                                                                                                                                                                              • ?nf_registerDriver@nfapi@@YA?AW4_NF_STATUS@@PBD@Z.NFAPI(?), ref: 004010CA
                                                                                                                                                                                                                              • ?nf_unRegisterDriver@nfapi@@YA?AW4_NF_STATUS@@PBD@Z.NFAPI(?), ref: 004010DB
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • nfregdvr, xrefs: 004010A2
                                                                                                                                                                                                                              • Usage: nfregdrv.exe <driver_name> - register windows\system32\drivers\<driver_name>.sys nfregdrv.exe -u <driver_name> - unregister windows\system32\drivers\<driver_name>.sys, xrefs: 004010A7
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CharDriver@nfapi@@Next$?nf_register?nf_unMessageRegister
                                                                                                                                                                                                                              • String ID: Usage: nfregdrv.exe <driver_name> - register windows\system32\drivers\<driver_name>.sys nfregdrv.exe -u <driver_name> - unregister windows\system32\drivers\<driver_name>.sys$nfregdvr
                                                                                                                                                                                                                              • API String ID: 1889258244-2180452595
                                                                                                                                                                                                                              • Opcode ID: 3a882d4fb6fe95bf0d5de4b4e3cf2f64ab34e96ef2f70e27ee227c43f8033b4f
                                                                                                                                                                                                                              • Instruction ID: 1ab8e34958d480acc8493b27089cbdf5696b9cf7d697ab9778d1d713517b65dd
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3a882d4fb6fe95bf0d5de4b4e3cf2f64ab34e96ef2f70e27ee227c43f8033b4f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8F01DE705082806AE70163746E057877A806F55755F08C87BF9D4B63E2E6B88898C7BF
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100141E6
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100141FA
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,00000000,?,0000024A,00000000,00000000,?,00000000), ref: 10014287
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014297
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: c1d6194b3b625dbf574e7b20ed250350b817444bdaab0ad358dee30cb838081e
                                                                                                                                                                                                                              • Instruction ID: 85bbbeb16c55dea885b82d2df4faedcc8aa5688a631ff53f8ce63f3f1ec5c482
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c1d6194b3b625dbf574e7b20ed250350b817444bdaab0ad358dee30cb838081e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 17110A76510210AFE700CB68DC89E9633E9EF89761F51C215F6168F1E5EF70EAC4C6A1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • IsDebuggerPresent.KERNEL32 ref: 1000A7F0
                                                                                                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 1000A805
                                                                                                                                                                                                                              • UnhandledExceptionFilter.KERNEL32(100198DC), ref: 1000A810
                                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 1000A82C
                                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 1000A833
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2579439406-0
                                                                                                                                                                                                                              • Opcode ID: 06ef2c53437fd46401bc4568d3fe183aff5b9b3a6a8811e184a836bfc1ef5544
                                                                                                                                                                                                                              • Instruction ID: 5cd202c4d6932f10897f274e1b34921bd933b478cb37430cfba53272a53993d9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 06ef2c53437fd46401bc4568d3fe183aff5b9b3a6a8811e184a836bfc1ef5544
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9E21AEB89083259FF701DF94DCC46647BE4FB28754F40D15EE508872A5E7B0D9808F45
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 10014010
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014025
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,0022019C,00000000,00000000,00000000,00000004,00000000,00000000), ref: 10014049
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001405F
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: 4981ae034996778ee2c8bf16bcf631c7842ba69716a9c5caf53513e94cd4e299
                                                                                                                                                                                                                              • Instruction ID: 194b0543918d9f7547c24edad603a73f0d8bc4c4cca9a48bf73c364b07b3f58e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4981ae034996778ee2c8bf16bcf631c7842ba69716a9c5caf53513e94cd4e299
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E8F09674A10310AFF701EB60ED89B8937A6EB98F12FC2C514F7098A1E1D7B5D95CC662
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014176
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001418B
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201D0,00000000,00000000,00000000,00000000,?,00000000), ref: 100141AD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100141BC
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: ed04f4c91301ef5749866e6216c76f80c91ee0689320974670393c5e7210247c
                                                                                                                                                                                                                              • Instruction ID: ea0cb0fdb19bb7dbbc03564ec765e3cd75472be6806d2b7526bfc3e15de05ea0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ed04f4c91301ef5749866e6216c76f80c91ee0689320974670393c5e7210247c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 83F03974261310BFF205D7749D8AF5533A9EF18B32F628708F62AD90E1DF70E8449A51
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,100175DD,10020370), ref: 100013FC
                                                                                                                                                                                                                              • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,100175DD,10020370), ref: 10001411
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: EventInfoResetSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3761259369-0
                                                                                                                                                                                                                              • Opcode ID: 508fc2042419c3a36b202234b76a069f5d08a4c1d9f6591d6dd30bc335c3ad5d
                                                                                                                                                                                                                              • Instruction ID: 39d4c7a7ad4dc565fb3197904db44af1b56c26df66e8bdcd4ed7d8d6cef16289
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 508fc2042419c3a36b202234b76a069f5d08a4c1d9f6591d6dd30bc335c3ad5d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DE210172A002119BE320CE14CD40F9B73EAEFC4790F0A891CED5A9B268EA71FD4487D1

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _strcpy_s.LIBCMT ref: 1000A59E
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000A5AF
                                                                                                                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,1001F3C9,00000104), ref: 1000A5CB
                                                                                                                                                                                                                              • _strcpy_s.LIBCMT ref: 1000A5E0
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000A5F3
                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 1000A5FC
                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 1000A609
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000A636
                                                                                                                                                                                                                              • _strcat_s.LIBCMT ref: 1000A649
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000A65A
                                                                                                                                                                                                                              • _strcat_s.LIBCMT ref: 1000A66B
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000A67C
                                                                                                                                                                                                                              • GetStdHandle.KERNEL32(000000F4,00000001,00000001,00000000,76EC5E70,00000003,1000A6FE,000000FC,10007C34,00000001,00000000,00000000,?,1000B162,?,00000001), ref: 1000A69B
                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 1000A6BC
                                                                                                                                                                                                                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,1000B162,?,00000001,00000001,1000949D,00000018,1001B628,0000000C,1000952C,00000001), ref: 1000A6C6
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                                                                                                                                                                                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                                                                                                                                              • API String ID: 1879448924-4022980321
                                                                                                                                                                                                                              • Opcode ID: 4af349e1e8f6137c98c74494d34e3a9ba254edd55f11037dcb0b6f13b7d5c0d9
                                                                                                                                                                                                                              • Instruction ID: ea148cf6e80d7e79cea2e11fe5e00895b7d8e29f61cf08ee7211173885be836a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4af349e1e8f6137c98c74494d34e3a9ba254edd55f11037dcb0b6f13b7d5c0d9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E83118B69001252AF600E6208C56F7F369CEF172D0F050225FD49A519BEF37EEC241B6

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 303 4017b5-4017bf 304 4017c1-4017c8 303->304 305 4017d0-4017d3 304->305 306 4017ca-4017ce 304->306 307 401950-401954 305->307 308 4017d9-4017e5 call 403850 305->308 306->304 306->305 311 4017eb-4017f5 call 403850 308->311 312 40191c-401928 GetStdHandle 308->312 319 401804-40180a 311->319 320 4017f7-4017fe 311->320 313 40192a-40192d 312->313 314 40194f 312->314 313->314 316 40192f-401949 call 403760 WriteFile 313->316 314->307 316->314 319->314 322 401810-40182b call 4037eb 319->322 320->312 320->319 325 40183a-401856 GetModuleFileNameA 322->325 326 40182d-401837 call 402d4d 322->326 327 401858-40186d call 4037eb 325->327 328 40187e-401889 call 403760 325->328 326->325 327->328 335 40186f-40187b call 402d4d 327->335 336 4018c3 328->336 337 40188b-4018b0 call 403760 call 4036a2 328->337 335->328 338 4018c5-4018d6 call 403631 336->338 337->336 349 4018b2-4018c1 call 402d4d 337->349 346 4018e5-4018f8 call 403631 338->346 347 4018d8-4018e2 call 402d4d 338->347 356 401907-40191a call 403474 346->356 357 4018fa-401904 call 402d4d 346->357 347->346 349->338 356->314 357->356
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _strcpy_s.LIBCMT ref: 00401821
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 00401832
                                                                                                                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,0040B059,00000104), ref: 0040184E
                                                                                                                                                                                                                              • _strcpy_s.LIBCMT ref: 00401863
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 00401876
                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 0040187F
                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 0040188C
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 004018B9
                                                                                                                                                                                                                              • _strcat_s.LIBCMT ref: 004018CC
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 004018DD
                                                                                                                                                                                                                              • _strcat_s.LIBCMT ref: 004018EE
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 004018FF
                                                                                                                                                                                                                              • GetStdHandle.KERNEL32(000000F4,?,?,00000000,76EC5E70,00000003,00401981,000000FC,00405D85,00000001,00000000,00000000,?,004040D4,?,00000001), ref: 0040191E
                                                                                                                                                                                                                              • _strlen.LIBCMT ref: 0040193F
                                                                                                                                                                                                                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,004040D4,?,00000001,?,00402C9C,00000018,004094A0,0000000C,00402D2B,?), ref: 00401949
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                                                                                                                                                                                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                                                                                                                                              • API String ID: 1879448924-4022980321
                                                                                                                                                                                                                              • Opcode ID: 38520d41a68f396a59cc94f311c6a7ce392be311100e9e9c31ac4f97fc74b26a
                                                                                                                                                                                                                              • Instruction ID: ac205ba077d332f24294b0c45a0e422cb4ceea3e0f9d8061dc6338a319882752
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 38520d41a68f396a59cc94f311c6a7ce392be311100e9e9c31ac4f97fc74b26a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 043126E26402057AE6213A265E4AF2F3A4C9B01755F14403BFD45B22F3FA7E9A1181FE
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,10008AB7,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608,0000000C,10008CE1,?), ref: 1000AD16
                                                                                                                                                                                                                              • __mtterm.LIBCMT ref: 1000AD22
                                                                                                                                                                                                                                • Part of subcall function 1000A9FB: TlsFree.KERNEL32(00000001,10008B53,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608,0000000C,10008CE1,?), ref: 1000AA26
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 1000AD38
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 1000AD45
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 1000AD52
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 1000AD5F
                                                                                                                                                                                                                              • TlsAlloc.KERNEL32(?,?,00000001,?,?,10008C27,00000001,?,?,1001B608,0000000C,10008CE1,?), ref: 1000ADAF
                                                                                                                                                                                                                              • TlsSetValue.KERNEL32(00000000,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608,0000000C,10008CE1,?), ref: 1000ADCA
                                                                                                                                                                                                                              • __init_pointers.LIBCMT ref: 1000ADD4
                                                                                                                                                                                                                              • __calloc_crt.LIBCMT ref: 1000AE49
                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 1000AE79
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressProc$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                                                                                                                                                                                                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 630932248-3819984048
                                                                                                                                                                                                                              • Opcode ID: 27197f949f2674e2884e29655a0beec5e1f2c8da553a5096224482f203d367b5
                                                                                                                                                                                                                              • Instruction ID: 1b7aacb4b742e95e3da3d0493d0b543e31d3ba40a5e9cc7053759451afc8b022
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 27197f949f2674e2884e29655a0beec5e1f2c8da553a5096224482f203d367b5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D5317EB1801262AAFB10EF78CC85A253FA4EB622D0B22C72EF425C71A4DF35C4C0CB51

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 421 40267f-40268f GetModuleHandleA 422 402691-402699 call 4023d3 421->422 423 40269a-4026e2 GetProcAddress * 4 421->423 424 4026e4-4026eb 423->424 425 4026fa-402719 423->425 424->425 428 4026ed-4026f4 424->428 429 40271e-40272c TlsAlloc 425->429 428->425 430 4026f6-4026f8 428->430 431 402732-40273d TlsSetValue 429->431 432 4027fe 429->432 430->425 430->429 431->432 433 402743-402792 call 401769 call 4022b3 * 4 call 402b9c 431->433 434 402800-402802 432->434 447 402794-4027af call 40232a 433->447 448 4027f9 call 4023d3 433->448 447->448 453 4027b1-4027c3 call 404107 447->453 448->432 453->448 456 4027c5-4027dc call 40232a 453->456 456->448 460 4027de-4027f7 call 402410 GetCurrentThreadId 456->460 460->434
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00401248), ref: 00402685
                                                                                                                                                                                                                              • __mtterm.LIBCMT ref: 00402691
                                                                                                                                                                                                                                • Part of subcall function 004023D3: TlsFree.KERNEL32(00000003,004027FE), ref: 004023FE
                                                                                                                                                                                                                                • Part of subcall function 004023D3: DeleteCriticalSection.KERNEL32(00000000,00000000,7591DFB0,00000001,004027FE), ref: 00402C00
                                                                                                                                                                                                                                • Part of subcall function 004023D3: DeleteCriticalSection.KERNEL32(00000003,7591DFB0,00000001,004027FE), ref: 00402C2A
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 004026A7
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 004026B4
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 004026C1
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 004026CE
                                                                                                                                                                                                                              • TlsAlloc.KERNEL32 ref: 0040271E
                                                                                                                                                                                                                              • TlsSetValue.KERNEL32(00000000), ref: 00402739
                                                                                                                                                                                                                              • __init_pointers.LIBCMT ref: 00402743
                                                                                                                                                                                                                              • __calloc_crt.LIBCMT ref: 004027B8
                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 004027E8
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                                                                                                                                                                                                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 2125014093-3819984048
                                                                                                                                                                                                                              • Opcode ID: 566b6117ed883b32ce1da04161b31b8634341426bd229c3b9e021c861b04e7bb
                                                                                                                                                                                                                              • Instruction ID: cf69b49cc4cf955eeb84bbbee0c69ed19c09a43a9505152bb4945c0e988a6b5c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 566b6117ed883b32ce1da04161b31b8634341426bd229c3b9e021c861b04e7bb
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EF313931900311DADB51AB75AF49A063BA4EB44354B10053FE994B72F2DFB98540DF9E
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetEvent.KERNEL32(FFFFFFFF), ref: 100175B7
                                                                                                                                                                                                                                • Part of subcall function 100013F0: ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,100175DD,10020370), ref: 100013FC
                                                                                                                                                                                                                                • Part of subcall function 100013F0: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,100175DD,10020370), ref: 10001411
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(100203D8,100203F0,10020370), ref: 10017613
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(100203D8), ref: 10017621
                                                                                                                                                                                                                              • ReadFile.KERNEL32(FFFFFFFF,?,00000008,00000000,?), ref: 10017661
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 1001766B
                                                                                                                                                                                                                              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,0000000A), ref: 1001768B
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(100203D8), ref: 100176B7
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(100203D8), ref: 100176C4
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 100176D9
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 100176ED
                                                                                                                                                                                                                              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,00001388), ref: 10017700
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(FFFFFFFF,00000000), ref: 10017719
                                                                                                                                                                                                                              • GetOverlappedResult.KERNEL32(FFFFFFFF,?,?,00000000), ref: 10017739
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(100203D8), ref: 100177F0
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(100203D8), ref: 100177FD
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 10017812
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 10017826
                                                                                                                                                                                                                              • CancelIo.KERNEL32(FFFFFFFF), ref: 10017847
                                                                                                                                                                                                                              • SetEvent.KERNEL32(FFFFFFFF), ref: 10017868
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Event$CriticalSection$EnterLeaveWait$MultipleObjects$CancelErrorFileInfoLastObjectOverlappedReadResetResultSingleSystem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2252100280-0
                                                                                                                                                                                                                              • Opcode ID: e910f63d7a54be93efb29594c5c449f4169a1d0cc538782f8b68b19805b9bf9f
                                                                                                                                                                                                                              • Instruction ID: f695dd025300f569b5dc1954a0fe927f0ea0d4c7cb43f690e196a72113c686ee
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e910f63d7a54be93efb29594c5c449f4169a1d0cc538782f8b68b19805b9bf9f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 147180719093A19FE341DB64CCC4A5E7BFAFB88344F51881DF549CB262D630E945CB52
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __snprintf.LIBCMT ref: 100137C7
                                                                                                                                                                                                                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,40000000,00000000,?,?,?,?,00000000), ref: 100137EF
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 100137F9
                                                                                                                                                                                                                              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,40000000,00000000,?,?,?,?,?,00000000), ref: 10013846
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 1001384A
                                                                                                                                                                                                                              • _memset.LIBCMT ref: 1001386F
                                                                                                                                                                                                                              • GetVersionExA.KERNEL32 ref: 10013884
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(00000000,0022019C,00000000,00000000,?,00000004,?,00000000), ref: 100138A8
                                                                                                                                                                                                                              • SetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 10013975
                                                                                                                                                                                                                                • Part of subcall function 10013540: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 100135C3
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ErrorLast$CreateFile$ControlDeviceManagerOpenVersion__snprintf_memset
                                                                                                                                                                                                                              • String ID: %s%s$360netmon$\\.\CtrlSM$aswstm$aswstm$nisdrv$symnets
                                                                                                                                                                                                                              • API String ID: 3009835240-779568551
                                                                                                                                                                                                                              • Opcode ID: a3a7f9f4621a4370de1945aa5ff1c6f54205322984f1227c5b51e51712c71830
                                                                                                                                                                                                                              • Instruction ID: baa3f68826ae7ef6a95450bd968b4d24564606f9d9b479f6fa913fa53dd98394
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a3a7f9f4621a4370de1945aa5ff1c6f54205322984f1227c5b51e51712c71830
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B641F6F5904341ABE610DB649C82F9B77E8EB81758F00852DF6456A1C2EB71E9C8C763
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\GroupOrderList,00000000,00000003,?,?,00000001,?,?,00000000), ref: 10012E39
                                                                                                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,PNP_TDI,00000000,?,00000000,?,00000000), ref: 10012E70
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,00000001), ref: 10012E7B
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                              • String ID: PNP_TDI$PNP_TDI$PNP_TDI$SYSTEM\CurrentControlSet\Control\GroupOrderList
                                                                                                                                                                                                                              • API String ID: 3677997916-2641009432
                                                                                                                                                                                                                              • Opcode ID: 2eb10eaa1c7938493b03d9852b263a48069f7a2f456ef6b17a8b5cbc44dafcf6
                                                                                                                                                                                                                              • Instruction ID: adba37e169228668f0a2802fe9bc245960bfac646b6212eb4cbe9f041a721e83
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2eb10eaa1c7938493b03d9852b263a48069f7a2f456ef6b17a8b5cbc44dafcf6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6531A1B6500311ABE711DB64EC86FDB77E8EF48641F504428F649D7240E730E854C7A1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __snprintf.LIBCMT ref: 10013094
                                                                                                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00000003,?,?,?,?,?), ref: 100130AF
                                                                                                                                                                                                                              • RegSetValueExA.ADVAPI32(?,Group,00000000,00000001,?,00000005), ref: 100130F6
                                                                                                                                                                                                                              • RegSetValueExA.ADVAPI32(?,DependOnService,00000000,00000007,?,00000007), ref: 1001310D
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 10013133
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$CloseOpen__snprintf
                                                                                                                                                                                                                              • String ID: DependOnService$Group$Group$NDIS$PNP_TDI$SYSTEM\CurrentControlSet\Services\%s$tcpip
                                                                                                                                                                                                                              • API String ID: 1654562893-4206996638
                                                                                                                                                                                                                              • Opcode ID: 8e36c738326b6755c6e6de9151109be2b92cdf69e4b2cd075e3ef94430a67263
                                                                                                                                                                                                                              • Instruction ID: f39133bfa4f10865251ae0e01663f88c1eeb0859d6cfe85fe8bdc8d9a42c57b8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8e36c738326b6755c6e6de9151109be2b92cdf69e4b2cd075e3ef94430a67263
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AF316675618350AFE715CB64CC91FAB77E5AB8D710F40C80CF68897290EA74E984CBD2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000EA3F
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 1000EA5B
                                                                                                                                                                                                                                • Part of subcall function 1000A8A7: TlsGetValue.KERNEL32(00000000,1000A91C,00000000,1000EA20,00000000,00000000,00000314,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000A8B4
                                                                                                                                                                                                                                • Part of subcall function 1000A8A7: TlsGetValue.KERNEL32(00000002,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000A8CB
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000EA78
                                                                                                                                                                                                                                • Part of subcall function 1000A8A7: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000A8E0
                                                                                                                                                                                                                                • Part of subcall function 1000A8A7: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 1000A8FB
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000EA8D
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000EAAE
                                                                                                                                                                                                                                • Part of subcall function 100081EF: _memset.LIBCMT ref: 1000827B
                                                                                                                                                                                                                                • Part of subcall function 100081EF: IsDebuggerPresent.KERNEL32(?,?,00000000), ref: 10008299
                                                                                                                                                                                                                                • Part of subcall function 100081EF: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 100082A3
                                                                                                                                                                                                                                • Part of subcall function 100081EF: UnhandledExceptionFilter.KERNEL32(1001F3B0,?,?,00000000), ref: 100082AD
                                                                                                                                                                                                                                • Part of subcall function 100081EF: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 100082C8
                                                                                                                                                                                                                                • Part of subcall function 100081EF: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 100082CF
                                                                                                                                                                                                                                • Part of subcall function 1000A91E: TlsGetValue.KERNEL32(?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608), ref: 1000A92B
                                                                                                                                                                                                                                • Part of subcall function 1000A91E: TlsGetValue.KERNEL32(00000002,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001), ref: 1000A942
                                                                                                                                                                                                                                • Part of subcall function 1000A91E: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001), ref: 1000A957
                                                                                                                                                                                                                                • Part of subcall function 1000A91E: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 1000A972
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 1000EAC2
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 1000EADA
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 1000EB4D
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentDebuggerLibraryLoadPresentTerminate_memset
                                                                                                                                                                                                                              • String ID: GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                                                                                                                                                                              • API String ID: 2940365033-1046234306
                                                                                                                                                                                                                              • Opcode ID: d07f4621edcdfa6a2460bf8fc81f84a922532c73ec9128826bd03ea427b93a6a
                                                                                                                                                                                                                              • Instruction ID: 9cd623b29455d8c5ce966f6a502c8aefc0998dc8575b976e3ae0cba05518725e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d07f4621edcdfa6a2460bf8fc81f84a922532c73ec9128826bd03ea427b93a6a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0D418C75D04299AAFF04EFA4CCC596E7BE9EF153C0B11452EE402F2155DB38EA848B62
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004034A1
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004034BD
                                                                                                                                                                                                                                • Part of subcall function 004022B3: TlsGetValue.KERNEL32(00000000,00402328,00000000,00403482,00000000,00000000,00000314,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004022C0
                                                                                                                                                                                                                                • Part of subcall function 004022B3: TlsGetValue.KERNEL32(00000006,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004022D7
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004034DA
                                                                                                                                                                                                                                • Part of subcall function 004022B3: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004022EC
                                                                                                                                                                                                                                • Part of subcall function 004022B3: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00402307
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004034EF
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 00403510
                                                                                                                                                                                                                                • Part of subcall function 00402D4D: IsDebuggerPresent.KERNEL32(?,?,00000000), ref: 00402DF7
                                                                                                                                                                                                                                • Part of subcall function 00402D4D: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 00402E01
                                                                                                                                                                                                                                • Part of subcall function 00402D4D: UnhandledExceptionFilter.KERNEL32(0040B040,?,?,00000000), ref: 00402E0B
                                                                                                                                                                                                                                • Part of subcall function 00402D4D: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 00402E26
                                                                                                                                                                                                                                • Part of subcall function 00402D4D: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 00402E2D
                                                                                                                                                                                                                                • Part of subcall function 0040232A: TlsGetValue.KERNEL32(00000000,004023BF,?,004024E4,?,?,0040199A), ref: 00402337
                                                                                                                                                                                                                                • Part of subcall function 0040232A: TlsGetValue.KERNEL32(00000006,?,004024E4,?,?,0040199A), ref: 0040234E
                                                                                                                                                                                                                                • Part of subcall function 0040232A: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,004024E4,?,?,0040199A), ref: 00402363
                                                                                                                                                                                                                                • Part of subcall function 0040232A: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0040237E
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 00403524
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0040353C
                                                                                                                                                                                                                              • __invoke_watson.LIBCMT ref: 004035AF
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentDebuggerLibraryLoadPresentTerminate
                                                                                                                                                                                                                              • String ID: GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                                                                                                                                                                              • API String ID: 2691309996-1046234306
                                                                                                                                                                                                                              • Opcode ID: f1db5f22bdf6dbb55a5fef3c5404ea4e20a60e7af2fc674b508acf6c650a639d
                                                                                                                                                                                                                              • Instruction ID: 13767e751e4e8118919b7ef88e5ef330d54a0fa0e132c7187f46cb55eadbc1d1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f1db5f22bdf6dbb55a5fef3c5404ea4e20a60e7af2fc674b508acf6c650a639d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FC416271D04205BACF21AFE59E8596F7FACEB44356B14487FE401F22D0DBBD8A408A9D
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 10017AF0
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10017CE3
                                                                                                                                                                                                                                • Part of subcall function 10012D70: RegOpenKeyExA.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters,00000000,00000003,?,?,?,10013525,00000000), ref: 10012D86
                                                                                                                                                                                                                                • Part of subcall function 10012D00: RegOpenKeyExA.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Services\Tcpip\Parameters,00000000,00000002,00000000,00000000,00000000), ref: 10012D15
                                                                                                                                                                                                                                • Part of subcall function 10013790: __snprintf.LIBCMT ref: 100137C7
                                                                                                                                                                                                                                • Part of subcall function 10013790: CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,40000000,00000000,?,?,?,?,00000000), ref: 100137EF
                                                                                                                                                                                                                                • Part of subcall function 10013790: GetLastError.KERNEL32(?,?,?,?,00000000), ref: 100137F9
                                                                                                                                                                                                                                • Part of subcall function 10013790: CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,40000000,00000000,?,?,?,?,?,00000000), ref: 10013846
                                                                                                                                                                                                                                • Part of subcall function 10013790: GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 1001384A
                                                                                                                                                                                                                                • Part of subcall function 10013790: _memset.LIBCMT ref: 1001386F
                                                                                                                                                                                                                                • Part of subcall function 10013790: GetVersionExA.KERNEL32 ref: 10013884
                                                                                                                                                                                                                                • Part of subcall function 10013790: DeviceIoControl.KERNEL32(00000000,0022019C,00000000,00000000,?,00000004,?,00000000), ref: 100138A8
                                                                                                                                                                                                                              • _strncpy.LIBCMT ref: 10017B59
                                                                                                                                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10017B93
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,0012C800,00000000,00000000,10020180,00000020,00000000,?), ref: 10017BD9
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 10017BE3
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(FFFFFFFF), ref: 10017C01
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10017C13
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10017C1A
                                                                                                                                                                                                                              • GetOverlappedResult.KERNEL32(FFFFFFFF,?,?,00000001), ref: 10017C48
                                                                                                                                                                                                                              • ?nf_free@nfapi@@YAXXZ.NFAPI ref: 10017CC2
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CreateCriticalErrorLastSection$CloseControlDeviceFileHandleLeaveOpen$?nf_free@nfapi@@EnterEventOverlappedResultVersion__snprintf_memset_strncpy
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2653159964-3916222277
                                                                                                                                                                                                                              • Opcode ID: 3f87b7c55b4061039f33afb2760d837fa2a97d9a8f10da4fd9a74bcaa174a95a
                                                                                                                                                                                                                              • Instruction ID: 607d77e5ab761dd3358ab37ac97749732553c8b829fe0467e4f2801d9018e119
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f87b7c55b4061039f33afb2760d837fa2a97d9a8f10da4fd9a74bcaa174a95a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3F51C0B08043549FE341CF38CCC565A7BE9FB08364F60462DF559DB2A2D735DA858B92
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020324), ref: 10014D6E
                                                                                                                                                                                                                              • WriteFile.KERNEL32(FFFFFFFF,?,00000008,00000000,?), ref: 10014DF8
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 10014E02
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020324), ref: 10014E14
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$EnterErrorFileLastLeaveWrite
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1726892732-0
                                                                                                                                                                                                                              • Opcode ID: 9df71c563617eb9f339eaef5488ee90d51df01b4ebf1fcf1fc522e00c65f13bd
                                                                                                                                                                                                                              • Instruction ID: e6d18f47d42f15309a32aad744ee6051ace0a6f11929ee79e8724ce5300da237
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9df71c563617eb9f339eaef5488ee90d51df01b4ebf1fcf1fc522e00c65f13bd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 14515971A043219FD304CF68EC84A66B7E9FB88720F118A5EF959CB2A1DB30D9458B91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020324,?,?,?,?,?,?,?,?,?,1001536D), ref: 10014F3F
                                                                                                                                                                                                                              • WriteFile.KERNEL32(FFFFFFFF,?,00000008,00000000,?), ref: 10014F8F
                                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 10014F99
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020324), ref: 10014FAB
                                                                                                                                                                                                                              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 10014FC6
                                                                                                                                                                                                                              • CancelIo.KERNEL32(FFFFFFFF), ref: 10014FD7
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020324), ref: 10014FE2
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(FFFFFFFF,00000000), ref: 10014FF9
                                                                                                                                                                                                                              • CancelIo.KERNEL32(FFFFFFFF), ref: 10015009
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020324), ref: 10015014
                                                                                                                                                                                                                              • GetOverlappedResult.KERNEL32(FFFFFFFF,?,?,00000000), ref: 1001502F
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020324), ref: 1001504B
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$CancelWait$EnterErrorFileLastMultipleObjectObjectsOverlappedResultSingleWrite
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 875271372-0
                                                                                                                                                                                                                              • Opcode ID: 4956b33f9505844bcca6f3e2d83279b108e1b3c573e129efff33a3fba19fd776
                                                                                                                                                                                                                              • Instruction ID: 56031a59c6608db13f70e1c4f4aa1c6cc63b7cc0fadcfe5918aabc4c2d2b60d1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4956b33f9505844bcca6f3e2d83279b108e1b3c573e129efff33a3fba19fd776
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B3418E359043209FE305CF68CCC5A6A77E5FB88760F51CA1DF9A9CA2A1DB30D9458B92
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,1001B668,0000000C,1000AB49,00000000,00000000,?,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000), ref: 1000AA49
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,EncodePointer), ref: 1000AA7D
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 1000AA8D
                                                                                                                                                                                                                              • InterlockedIncrement.KERNEL32(1001E5E0), ref: 1000AAAF
                                                                                                                                                                                                                              • __lock.LIBCMT ref: 1000AAB7
                                                                                                                                                                                                                              • ___addlocaleref.LIBCMT ref: 1000AAD6
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                                                                                                                                                                                                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 1036688887-2843748187
                                                                                                                                                                                                                              • Opcode ID: 6cb8d5c28d5074f433760f6667332ab0361c674de9d04a8c3266a8bd50229b50
                                                                                                                                                                                                                              • Instruction ID: bcf2beea3aee41d2aa15f995c6c6d73addff0134c8f7c4ab08a319bce46e109a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6cb8d5c28d5074f433760f6667332ab0361c674de9d04a8c3266a8bd50229b50
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9F116DB49007469FEB11DF75CC45B9ABBE0EF06380F008519E5A59B291DB34EA80CB11
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,00409438,0000000C,00402521,00000000,00000000,?,?,0040199A), ref: 00402421
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,EncodePointer), ref: 00402455
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00402465
                                                                                                                                                                                                                              • InterlockedIncrement.KERNEL32(0040A460), ref: 00402487
                                                                                                                                                                                                                              • __lock.LIBCMT ref: 0040248F
                                                                                                                                                                                                                              • ___addlocaleref.LIBCMT ref: 004024AE
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                                                                                                                                                                                                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 1036688887-2843748187
                                                                                                                                                                                                                              • Opcode ID: 492f236ed60c7165788bb238f70ef5b424b799d510fd4f5d693c5339c7311626
                                                                                                                                                                                                                              • Instruction ID: c1e121c7a9f45585e2cf3b5064cbb5a882fb755c8da4f7f00742ea9dc2ffa3f8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 492f236ed60c7165788bb238f70ef5b424b799d510fd4f5d693c5339c7311626
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C41182719407019ED710AF75DA49B5ABBE4EF44314F10853EE495B32D1CBBC9900CF19
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 10015FFC
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10016018
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10016046
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: 40f431bcfea2067bdb45210c7ca3e5ac481c5a134223d9d1211dde7a8a90e341
                                                                                                                                                                                                                              • Instruction ID: 371fddef53dbc4fe45c556ef6c540f006288db7d7992a80969627ba83df88eb7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 40f431bcfea2067bdb45210c7ca3e5ac481c5a134223d9d1211dde7a8a90e341
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C191A875A047009FD321CF28CD80A1AB7E5FF88750F418A6DF94A8B252D735E944CB92
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 10012F40: __snprintf.LIBCMT ref: 10012F6E
                                                                                                                                                                                                                                • Part of subcall function 10012F40: RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00000003,?,?,?,?,?), ref: 10012F89
                                                                                                                                                                                                                                • Part of subcall function 10012E20: RegOpenKeyExA.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\GroupOrderList,00000000,00000003,?,?,00000001,?,?,00000000), ref: 10012E39
                                                                                                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\GroupOrderList,00000000,00000003,?), ref: 1001343E
                                                                                                                                                                                                                              • RegSetValueExA.ADVAPI32(?,PNP_TDI,00000000,00000003,?,00000004), ref: 10013471
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 1001347C
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Open$CloseValue__snprintf
                                                                                                                                                                                                                              • String ID: PNP_TDI$SYSTEM\CurrentControlSet\Control\GroupOrderList$Tcpip$Tdx
                                                                                                                                                                                                                              • API String ID: 955868693-1105926044
                                                                                                                                                                                                                              • Opcode ID: fda263ff1de41ce67b71e2831dee39c8819067ff8ff0548a34e60e809be7e6e4
                                                                                                                                                                                                                              • Instruction ID: 9d99394d333599788a4544cf258fe4bbb44c0789f27ec8b116fc68fb94e8051e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fda263ff1de41ce67b71e2831dee39c8819067ff8ff0548a34e60e809be7e6e4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 236107715003019BC711DF28C881B9BB7E5FB81794F508B2CF9A59B181E732FA9AC792
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 100039B6
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168), ref: 10003C89
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10003CBA
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 10003CBE
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 10003CDD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10003D10
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 10003D80
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1001AF8C), ref: 10003DA0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2624469294-0
                                                                                                                                                                                                                              • Opcode ID: 73d3a381d48c90c82b24558e07d01c406c18051549b067fe898d807a957dde11
                                                                                                                                                                                                                              • Instruction ID: cb4e14372f68c81d32fb7b051c2ec7f8ea7fe710ba1d4691e8c8f5f753e74d5d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 73d3a381d48c90c82b24558e07d01c406c18051549b067fe898d807a957dde11
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 84D147755043459FE721EF24C98095AB7E9FF88790F02C91DE8999B249DB31FA00CFA2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 10002F36
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168), ref: 10003209
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 1000323A
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 1000323E
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 1000325D
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10003290
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 10003300
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1001AF8C), ref: 10003320
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2624469294-0
                                                                                                                                                                                                                              • Opcode ID: 6e5e0db70783d2082ef5619a72b906c060462fccdc8a4732c9d5e6cd8a7c2023
                                                                                                                                                                                                                              • Instruction ID: 7535f423654ff115b8a10d663302ad89ce6d265461ec07cf54a4ab5d377fff5f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6e5e0db70783d2082ef5619a72b906c060462fccdc8a4732c9d5e6cd8a7c2023
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 35D159755043459FE721DF54C98095AB7E9FF88790F12CA2DE8998B249DB30FA00CFA2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C,?,?,?,?,?,10015F9A,?,?,?,?,00000000,00000000), ref: 10015994
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,?,10015F9A,?,?,?,?,00000000,00000000), ref: 100159AA
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168,?,?,?,10015F9A,?,?,?,?,00000000,00000000), ref: 100159BD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168,?,?,?,10015F9A,?,?,?,?,00000000,00000000), ref: 100159EA
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 100159EE
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015A0D
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2624469294-0
                                                                                                                                                                                                                              • Opcode ID: 83a868a5a413f7be5035703166637c7b296de766c062b8faf5188e187a6a0587
                                                                                                                                                                                                                              • Instruction ID: 716dd50c4406e69af5a644168b3a8d86a91ffbed9d73fa53db93a722c9a7554d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 83a868a5a413f7be5035703166637c7b296de766c062b8faf5188e187a6a0587
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 86310972601315CFD711CF6CDC80999B7E6EF94262B6A822BF558CF251DB32D8448B92
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C,?,?,?,?,?,1001636E,?,00000000,?,?,00000000,00000000), ref: 10015AB4
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,?,1001636E,?,00000000,?,?,00000000,00000000), ref: 10015ACA
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168,?,?,?,1001636E,?,00000000,?,?,00000000,00000000), ref: 10015ADD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168,?,?,?,1001636E,?,00000000,?,?,00000000,00000000), ref: 10015B0A
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 10015B0E
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015B2D
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2624469294-0
                                                                                                                                                                                                                              • Opcode ID: 0b1f382d706e44ec0e1a58c49b7b50b2d9c2de06ca5ddb6f4ca569de45bb812b
                                                                                                                                                                                                                              • Instruction ID: 0036e264ff8d4791e783871741635e394cc451c67550918a7cfab00ff319ecfa
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b1f382d706e44ec0e1a58c49b7b50b2d9c2de06ca5ddb6f4ca569de45bb812b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BC310B72641355CFD311CF2CDC80999B3E5EF94262B6A422BF559CF252DB32E8448B91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014B16
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014B2B
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201BC,00000000,00000000,00000000,00000000,?,00000000), ref: 10014B54
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014B5F
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: 02bb3fff05f25983f8711dfb826126a47c4f04985e71065dc7fb2bdb1fcbf30f
                                                                                                                                                                                                                              • Instruction ID: 02a2f6b1c1c0d08758aff6957e8ee0c5b887a2a9afcc407cdac575b478d4874d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 02bb3fff05f25983f8711dfb826126a47c4f04985e71065dc7fb2bdb1fcbf30f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2521E772359311BFF210CBA8ACC6F963399EB84F71F224609F715AA0D1DF70E8448666
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014C06
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014C1B
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201BC,00000000,00000000,00000000,00000000,?,00000000), ref: 10014C44
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014C4F
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: 19f12ee8c8cf86aad4f1a8f5e61e85f259d81ceda6a06445ab1c933b9452340a
                                                                                                                                                                                                                              • Instruction ID: 4bb90ba6e2ddb0c313f38f00bcf08c1032174cdcc12a3aad3dba23a14210028a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 19f12ee8c8cf86aad4f1a8f5e61e85f259d81ceda6a06445ab1c933b9452340a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4A210872351311BFF210C7A8AC85F967399EB88F71F224608F7149A0D1DFB0E94486A5
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C,00000000,?,10017CBE), ref: 100179F9
                                                                                                                                                                                                                              • ResetEvent.KERNEL32(FFFFFFFF,?,10017CBE), ref: 10017A2E
                                                                                                                                                                                                                              • ResetEvent.KERNEL32(FFFFFFFF,?,10017CBE), ref: 10017A37
                                                                                                                                                                                                                              • ResetEvent.KERNEL32(FFFFFFFF,?,10017CBE), ref: 10017A40
                                                                                                                                                                                                                              • SetEvent.KERNEL32(FFFFFFFF), ref: 10017A67
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,10017CBE), ref: 10017A7C
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(FFFFFFFF,000000FF), ref: 10017A96
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10017AA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Event$CriticalResetSection$Leave$EnterObjectSingleWait
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 227606595-0
                                                                                                                                                                                                                              • Opcode ID: 0af12d4d274b4158eff6cb139f5dbd0a4003279a660a605caf6bf13278f8ed7d
                                                                                                                                                                                                                              • Instruction ID: 370ae82c3914d7338aeaefb3dba61d6cd4c1daa1705ad23ed54f4bf6628b88f1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0af12d4d274b4158eff6cb139f5dbd0a4003279a660a605caf6bf13278f8ed7d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 93115E729103719FF315DB648C88B5937A9EB4C761F21C319FA29861E1DB30D9418F91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 10016A2B
                                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 10016B87
                                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 10016CFD
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,76EBFFB0,00000000), ref: 10017214
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001721F
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$CountEnterTick$Leave
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1274362258-0
                                                                                                                                                                                                                              • Opcode ID: ef1edd5c790a106658f1642739d45defef9679afc4e8f9f2e44516cc589d5311
                                                                                                                                                                                                                              • Instruction ID: 3fd2e9f8bc7037484baf15cc0afc36f40eff77f3799c9f8376e09abcfaaf5b27
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ef1edd5c790a106658f1642739d45defef9679afc4e8f9f2e44516cc589d5311
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9BD15775A04645EFDB10CF14CC80A9AB7F5FF88354F108529F9598B252EB34FA86CBA1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • getSystemCP.LIBCMT ref: 1000F384
                                                                                                                                                                                                                                • Part of subcall function 1000F2F1: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1000F2FE
                                                                                                                                                                                                                                • Part of subcall function 1000F2F1: GetOEMCP.KERNEL32(00000000,?,1000D589,?,00000000,7591F380), ref: 1000F318
                                                                                                                                                                                                                              • setSBCS.LIBCMT ref: 1000F396
                                                                                                                                                                                                                                • Part of subcall function 1000F06E: _memset.LIBCMT ref: 1000F081
                                                                                                                                                                                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,00000000,1001B930), ref: 1000F3DC
                                                                                                                                                                                                                              • GetCPInfo.KERNEL32(00000000,1000F6EE), ref: 1000F3EF
                                                                                                                                                                                                                              • _memset.LIBCMT ref: 1000F407
                                                                                                                                                                                                                              • setSBUpLow.LIBCMT ref: 1000F4DA
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Locale_memset$CodeInfoPageSystemUpdateUpdate::_Valid
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2658552758-0
                                                                                                                                                                                                                              • Opcode ID: a816b4c44936828a5225c1a25b1e8420490dbca548ce3019b9a4bf18463ab438
                                                                                                                                                                                                                              • Instruction ID: 2d63987005470fd1933f97c79db1aac5b43ce9987930df9b1300e43a0dccfd1d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a816b4c44936828a5225c1a25b1e8420490dbca548ce3019b9a4bf18463ab438
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C25112719042568BEB15CF24C8802BFBBE4EF043C1F14846EED869B54AD638DA42EB91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10015845
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015855
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001586D
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168), ref: 10015874
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 100158A4
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 100158A8
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2624469294-0
                                                                                                                                                                                                                              • Opcode ID: af66a572ff308366c586223bea1b859f2b64d82aec888bcbbc6575e257e25f9f
                                                                                                                                                                                                                              • Instruction ID: b4838676840f3e74a045a70f2e4b7778d9ead1c68319ad0b4665687bbdc5929c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: af66a572ff308366c586223bea1b859f2b64d82aec888bcbbc6575e257e25f9f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EC31E532A002148FD711DF2CDC81969B3D6FF84261B59866AE828DF291EB32DC548BD1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 1001551F
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015533
                                                                                                                                                                                                                              • __aullrem.LIBCMT ref: 10015558
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,00000000,00000000), ref: 1001557E
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter__aullrem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1392406986-0
                                                                                                                                                                                                                              • Opcode ID: d1b92c9a15aa5841480ea886cd8603e293953e3d95721df58c3ef1283f84292e
                                                                                                                                                                                                                              • Instruction ID: eb2839e93686e6e60da02978a6273212bfb1d6ef73694f74e7e96aae41cfea2c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d1b92c9a15aa5841480ea886cd8603e293953e3d95721df58c3ef1283f84292e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 002104367006148FD310CB6DEC88A5577EBEF88672F654269FA1CCF291DB32D88486D0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10015753
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015763
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001577A
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168), ref: 10015781
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 100157A8
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 100157AC
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2624469294-0
                                                                                                                                                                                                                              • Opcode ID: 8d90196d2bee32e8d3484feec3460c9a7be0d346ac3607533073b5423734d643
                                                                                                                                                                                                                              • Instruction ID: 49e631b63e63f54fa41d8579300819fad08862a6ee69802ca296dd5302bd9675
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8d90196d2bee32e8d3484feec3460c9a7be0d346ac3607533073b5423734d643
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0121A176A04315CBD310DB28EC02A5973D5EB84761B0A436AE8588F2D1DB72D8508BD1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000000,1000A91C,00000000,1000EA20,00000000,00000000,00000314,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000A8B4
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000002,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000A8CB
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,1001F3B0,1000A694,1001F3B0,Microsoft Visual C++ Runtime Library,00012010), ref: 1000A8E0
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 1000A8FB
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: EncodePointer$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 1929421221-3682587211
                                                                                                                                                                                                                              • Opcode ID: 698cc03a02ed437f9e78c1477e8a38eecfbfb8aad5433eb0b7b92186c3789519
                                                                                                                                                                                                                              • Instruction ID: caffd8b91c38bffb5cca897b74d77eec42bfe04cae3721fbb3b20170df584618
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 698cc03a02ed437f9e78c1477e8a38eecfbfb8aad5433eb0b7b92186c3789519
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D9F01D30A05626AFFA51DB24CC8895A3BD8DF467D07028624F854E71B8DF30CED29B51
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608), ref: 1000A92B
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000002,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001), ref: 1000A942
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001), ref: 1000A957
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 1000A972
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: DecodePointer$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 1929421221-629428536
                                                                                                                                                                                                                              • Opcode ID: 849bf8aa20e695c811e63e4f389fbd3f38ad5f5727a41dc013945db67583cb91
                                                                                                                                                                                                                              • Instruction ID: bd257daf5de9dee36b7a7df8f8d7f9ef99228c3852669747f2885a7cf79806d7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 849bf8aa20e695c811e63e4f389fbd3f38ad5f5727a41dc013945db67583cb91
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9FF0F930A056229EEA52DB248C8899A7BD8EF463D07028224F968D7168DB30CDD18A51
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000000,00402328,00000000,00403482,00000000,00000000,00000314,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004022C0
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000006,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004022D7
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,0040B040,00401917,0040B040,Microsoft Visual C++ Runtime Library,00012010), ref: 004022EC
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00402307
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: EncodePointer$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 1929421221-3682587211
                                                                                                                                                                                                                              • Opcode ID: 1a385f102c7f14214112f7259b1974e6b0907a5b8e91fbf1077ec2ee8662ada9
                                                                                                                                                                                                                              • Instruction ID: 50336ba6c918c6c116f5e3fcbab542df5951bbe2d872b07961eb55563d71e960
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1a385f102c7f14214112f7259b1974e6b0907a5b8e91fbf1077ec2ee8662ada9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BFF06D301056129BDA529B74EF08A6B7BA5AF40394B15047AB854F62F4CF78CC11DA6D
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000000,004023BF,?,004024E4,?,?,0040199A), ref: 00402337
                                                                                                                                                                                                                              • TlsGetValue.KERNEL32(00000006,?,004024E4,?,?,0040199A), ref: 0040234E
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,004024E4,?,?,0040199A), ref: 00402363
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0040237E
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: DecodePointer$KERNEL32.DLL
                                                                                                                                                                                                                              • API String ID: 1929421221-629428536
                                                                                                                                                                                                                              • Opcode ID: b796f7a9d0800bb9e160982425eb8aa8e27173a6ee7dc456a018aa060cd778d7
                                                                                                                                                                                                                              • Instruction ID: b3a0eb18012e6aadf2811430fba97e87ad444e4cba862865431688a9bf4f90a9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b796f7a9d0800bb9e160982425eb8aa8e27173a6ee7dc456a018aa060cd778d7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A1F01230501623ABD712A734DF08A5B3AA59F41390715413ABC58F62F4DB7CCD12865D
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100018A4
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100018E0
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10001916
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100019BE
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10001A02
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10001A3C
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 10001AA3
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 10001AF7
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 10001B76
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10002045
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$EnterLeave
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3168844106-0
                                                                                                                                                                                                                              • Opcode ID: 1148cbf5bdb9481604341125c06b22783845d375c7f4a15b8700bf0034355e6e
                                                                                                                                                                                                                              • Instruction ID: 1c7db7b73577996e6f6b7cc1b13f752c77784736a4bb66c20c39e3569af504b5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1148cbf5bdb9481604341125c06b22783845d375c7f4a15b8700bf0034355e6e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3891D370A04384CFE710CF68C880B9AB7E6FF89384F45855DF8858B256D775E985CB62
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,10018530,000000FF), ref: 100178C1
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,?,?,?,?,?,?,?,?,?,?,10018530,000000FF), ref: 100178DD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10017906
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: 4fadeff10b6c9a286b6e83259b0211dd6e584e032f721b146db71c1fbee9745d
                                                                                                                                                                                                                              • Instruction ID: 744bdcced945026e525a1d70fd2b130064bd5c13945d0ecf707bb38ae523f875
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4fadeff10b6c9a286b6e83259b0211dd6e584e032f721b146db71c1fbee9745d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9141BF766083488FD700CF68EC8175AB7E9FB48764F10862AFD598B391DB35EA448A91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168,?,?,?,?,10016A9A,?,?,?,76EBFFB0,00000000), ref: 10013EE9
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10013F17
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 10013F22
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10013F69
                                                                                                                                                                                                                              • _memset.LIBCMT ref: 10013F7C
                                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 10013FA6
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$CountEnterTick_malloc_memset
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3854238366-0
                                                                                                                                                                                                                              • Opcode ID: ac07afc8388a069d4f83166ba5a0569cc62fde9cdb2ff454ac3c5f1d52a80147
                                                                                                                                                                                                                              • Instruction ID: 4ca0d7073e46e878efecada07f93c2f81ca96af553993ca0a0a66e884ec48b02
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ac07afc8388a069d4f83166ba5a0569cc62fde9cdb2ff454ac3c5f1d52a80147
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E23137B59003058FD745CF28DC80A867BF9FF49340B5182BAEC099F266EB31E955CB91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10015EEF
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015F03
                                                                                                                                                                                                                              • __aullrem.LIBCMT ref: 10015F28
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,00000000,00000000), ref: 10015F4E
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter__aullrem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1392406986-0
                                                                                                                                                                                                                              • Opcode ID: 7ccb25e048fed005f5e0ad39f41a19acd61739f9bb35c0086ce996b125a16670
                                                                                                                                                                                                                              • Instruction ID: 962ddd3524da1f0e37931dc98e1f0c185814ed2e642f679040aa4322ebcbbac0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7ccb25e048fed005f5e0ad39f41a19acd61739f9bb35c0086ce996b125a16670
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 03213835300214DFC300CB69EC889A9B7DADB84572B5942B9FE18CF292E732DD4087A0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C,?,?,00000001,?,10016ABE,?,?,-00000067,?,?,?,76EBFFB0,00000000), ref: 100148A9
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,10016ABE,?,?,-00000067,?,?,?,76EBFFB0,00000000), ref: 100148BD
                                                                                                                                                                                                                              • _memset.LIBCMT ref: 100148E2
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,00220194,00000000,0000002C,00000000,0000002C,?,00000000), ref: 10014917
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014942
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter_memset
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 589867189-0
                                                                                                                                                                                                                              • Opcode ID: 8ebd72944f7a2a950c9ee27789203da092cdf93c9c74612e77d64f55a2891e3a
                                                                                                                                                                                                                              • Instruction ID: c706671d47631c6094ceacd85374c5c19a88f26d1054e66b0f3edaf9514eb2f3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8ebd72944f7a2a950c9ee27789203da092cdf93c9c74612e77d64f55a2891e3a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 971184752043119FE700DF64ECC5F5B77A9EF88765F218629F2199E1D2CB30D9498A60
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetEvent.KERNEL32(FFFFFFFF,?,?,?,100156AB), ref: 1001561F
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(FFFFFFFF,000000FF,?,?,?,100156AB), ref: 1001563F
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,100156AB), ref: 1001564C
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,?,?,100156AB), ref: 1001566D
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,100156AB), ref: 1001567C
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,100156AB), ref: 10015684
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseEventHandleObjectSingleWait
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2055531096-0
                                                                                                                                                                                                                              • Opcode ID: 2b52fc261705a2240190288487bb20031f43a560c2463843fdaa4baee3aae0d6
                                                                                                                                                                                                                              • Instruction ID: f07f506387550c76cd1d2b3446689fb9bb28019f0ffc834db263f1ad7541274e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2b52fc261705a2240190288487bb20031f43a560c2463843fdaa4baee3aae0d6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F7014B719003A19BE710DB69CCC4A1973A9A749374BB0C708F1348B6F1CB34E8828F24
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • QueryDosDeviceW.KERNEL32 ref: 1001646C
                                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?,?,?,?,?,?), ref: 100165A1
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020484), ref: 10016726
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020484), ref: 10016742
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$DeviceDriveEnterLeaveQueryType
                                                                                                                                                                                                                              • String ID: :
                                                                                                                                                                                                                              • API String ID: 2472114325-336475711
                                                                                                                                                                                                                              • Opcode ID: 5d0bb1d3aef29e5e2cf54168e896612a3619c67b40a50f6bad3d4d47fe3ea62b
                                                                                                                                                                                                                              • Instruction ID: 266c0d949fe9e03b7784f1c108ca597e8a181d292a197a77467f75c32d12edc8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5d0bb1d3aef29e5e2cf54168e896612a3619c67b40a50f6bad3d4d47fe3ea62b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 829149B54083818BE720CB64CC95B9BB7E5FF88344F44891EE6C98B255DB71E688CB53
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: __flsbuf$__flswbuf_wctomb_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3257920507-0
                                                                                                                                                                                                                              • Opcode ID: a75cccfa23d7aea3e5714c7e6dfbd81455f4b56c440ddb5dee57a86975d0e6af
                                                                                                                                                                                                                              • Instruction ID: aaf0d67127a989ff9fc8068fecdd25abf0f0f1beb550e9f4a5d15db8321f0729
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a75cccfa23d7aea3e5714c7e6dfbd81455f4b56c440ddb5dee57a86975d0e6af
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B351F43A3046559BD724CF2898829AE77A4EF063B4B60060AF4E59F2D2DBB4E9C1C751
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 10017308
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,00220198,?,00000004,?,?,1002030C,00000000), ref: 10017352
                                                                                                                                                                                                                                • Part of subcall function 10015070: EnterCriticalSection.KERNEL32 ref: 100150AF
                                                                                                                                                                                                                                • Part of subcall function 10015070: LeaveCriticalSection.KERNEL32(10020484,00000000,000000FF,00000000,000000FF,?,00000000), ref: 1001517C
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?), ref: 100174C8
                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000008), ref: 100174EB
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100174F6
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter$ControlDeviceErrorLast
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 4103992608-0
                                                                                                                                                                                                                              • Opcode ID: 0c15b7dd3d47d1301ec5051b298948f62488c9d0a0b22cccd62178c255bc7e81
                                                                                                                                                                                                                              • Instruction ID: 069ed3d1de4671eec97c8a091bf5bc0cd7826cd6fef9fe84e4e00e0bd1a0d2d6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0c15b7dd3d47d1301ec5051b298948f62488c9d0a0b22cccd62178c255bc7e81
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6B519B755183819FD320CB24C841B9BBBE8FF85750F408A1DF5998B291DB74E949CB93
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • getSystemCP.LIBCMT ref: 00403CC1
                                                                                                                                                                                                                                • Part of subcall function 00403C2E: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00403C3B
                                                                                                                                                                                                                                • Part of subcall function 00403C2E: GetOEMCP.KERNEL32(00000000,?,00401DD5), ref: 00403C55
                                                                                                                                                                                                                              • setSBCS.LIBCMT ref: 00403CD3
                                                                                                                                                                                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,00000000,00409560), ref: 00403D19
                                                                                                                                                                                                                              • GetCPInfo.KERNEL32(00000000,0040402B), ref: 00403D2C
                                                                                                                                                                                                                              • setSBUpLow.LIBCMT ref: 00403E17
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Locale$CodeInfoPageSystemUpdateUpdate::_Valid
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 364485666-0
                                                                                                                                                                                                                              • Opcode ID: f8562f73fbf6c12a93af662bf149bbf5becb5a351e9a22bc92b3aca215f4718f
                                                                                                                                                                                                                              • Instruction ID: 7ec157c4a63f4bee73c0373c95dbc61b6731b50ec73e293603ddc6fd57e301c6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f8562f73fbf6c12a93af662bf149bbf5becb5a351e9a22bc92b3aca215f4718f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8451E5719042549BDB15DF29C8806BABFA8EF05306F14817BD885BB2C2D63CDA46CBD9
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 10016897
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32 ref: 100168B8
                                                                                                                                                                                                                              • ?nf_tcpPostReceive@nfapi@@YA?AW4_NF_STATUS@@_KPBDH@Z.NFAPI(?,?,00000000,00000000), ref: 10016931
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10016948
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 100169C9
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$?nf_tcpCountEnterEventLeavePostReceive@nfapi@@S@@_Tick
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2201467506-0
                                                                                                                                                                                                                              • Opcode ID: 3b8d782bd27df50b16dfc65a62725b0131aeeeb5184073b4607cf5be4256a305
                                                                                                                                                                                                                              • Instruction ID: 742bec59b4eacf5a62cee880053408559a72dd2c9328244c4bf56ef4399b46ed
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3b8d782bd27df50b16dfc65a62725b0131aeeeb5184073b4607cf5be4256a305
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E0418B709087819FE310CF24CC84A6ABBEAFB88754F50491DF8D68B651D735ED858B42
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168), ref: 10013D19
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10013D47
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 10013D52
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10013D99
                                                                                                                                                                                                                              • _memset.LIBCMT ref: 10013DAC
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter_malloc_memset
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 923394041-0
                                                                                                                                                                                                                              • Opcode ID: d2436b13b8ff33d81ad853f571cd7b4f84e6fc360ee8814cc5edca94589bfc8a
                                                                                                                                                                                                                              • Instruction ID: 7167e3c78dd255bc3be61e05a3690e11657a4ad0a516055890c14454ff31153c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d2436b13b8ff33d81ad853f571cd7b4f84e6fc360ee8814cc5edca94589bfc8a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D4319CB15013018FE749CF18ECC1A567BA5FF98304B2582AEE8099F366DB31E959CF90
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014096
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100140AA
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,00000000,?,0000025B,00000000,00000000,?,00000000), ref: 10014137
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014147
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: c7db852ffef9afacecec687bb358ebba848a58d4b521bdcfc675cc6101f49ccd
                                                                                                                                                                                                                              • Instruction ID: 943a08fe69652d90c9d1f998fde71af210911f062dc05d4fd50d64c2a8c94902
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c7db852ffef9afacecec687bb358ebba848a58d4b521bdcfc675cc6101f49ccd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BE110A76500210AFE705CB68DC89ADB33D9EF88760F118219F6128B1E1EF70DA84C690
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100162DF
                                                                                                                                                                                                                              • __aullrem.LIBCMT ref: 100162F8
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,00000000,00000000), ref: 1001631E
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,00000000,00000000), ref: 10016346
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10016378
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter__aullrem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1392406986-0
                                                                                                                                                                                                                              • Opcode ID: a12b99a6437fde0b1fddeed73491248cb1b45896119e412d513d9bd3dbe0284c
                                                                                                                                                                                                                              • Instruction ID: 8b44c5907cacb563da89275e12a7b823dc438703cb38c6685e6cf52fab2f5aee
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a12b99a6437fde0b1fddeed73491248cb1b45896119e412d513d9bd3dbe0284c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E3115B313002059FD700CB69EC88DAEB3DEEF89561B5581A5FD08CF292E732ED5083A0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 1001497F
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014993
                                                                                                                                                                                                                              • __aullrem.LIBCMT ref: 100149B8
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,00000000,00000000), ref: 100149DE
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter__aullrem
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1392406986-0
                                                                                                                                                                                                                              • Opcode ID: 2404607320ef2a75d0717d5302f9e8fa9c4f34ddd1540ab3d998488c8b00b57d
                                                                                                                                                                                                                              • Instruction ID: 4e2cb47ff58eaee26e2a48776ae77e93d28fc32bba7de68dc87d4d27a697fb70
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2404607320ef2a75d0717d5302f9e8fa9c4f34ddd1540ab3d998488c8b00b57d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 441104317002449FD310CB68EC88F9A77DAEF85671F524295FA588B2A2DB31DC848691
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100152EF
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015303
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015321
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID: B
                                                                                                                                                                                                                              • API String ID: 2978645861-1255198513
                                                                                                                                                                                                                              • Opcode ID: d389180647d33e7fd7909b68b13a63dafe69a50724e4bfe4741239f59ea6ff70
                                                                                                                                                                                                                              • Instruction ID: 5862e67234fadea20cb6fb71e4dcca28f21175ac499c2c8a774871cc376374ad
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d389180647d33e7fd7909b68b13a63dafe69a50724e4bfe4741239f59ea6ff70
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C711C2327002188BDB01CF69ECC4599B7A5FF443B1B54826AFE2CCF292DB71D94486D0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100144A8
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100144EC
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201B4,?,00000014,00000000,00000000,00000000,00000000), ref: 10014513
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014522
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014533
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: a308096551d9751a7049de7f445834c6eeaff320b8b2092d6412a4f98500842a
                                                                                                                                                                                                                              • Instruction ID: a46a0420c4f18f8497baad094036f26d02c65c78e58f58d61c697df38c55562f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a308096551d9751a7049de7f445834c6eeaff320b8b2092d6412a4f98500842a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C7113C746147019FE304DF28DC85B5677E6FF88B21F81C64CF9598B2A2D770D908CA92
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100146D6
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100146EC
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201A4,?,00000010,?,00000004,?,00000000), ref: 1001471D
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014738
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: b6876661e5ff2c24c9972b30366f10f5fdaa2126c1ee03cc0ae946e3fb77ca8f
                                                                                                                                                                                                                              • Instruction ID: 2fba52e4ee8d058ba920c3b194ab9f094fa0f14e2d16636bf92fac5c4c939877
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b6876661e5ff2c24c9972b30366f10f5fdaa2126c1ee03cc0ae946e3fb77ca8f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7701D630715320AFE301CB24DC48BA633DAEF85B71F128609F6598B0E1CF70C984C6A1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 10001340: EnterCriticalSection.KERNEL32(?,?,?,?,100156AB), ref: 10001378
                                                                                                                                                                                                                                • Part of subcall function 10001340: LeaveCriticalSection.KERNEL32(10020350,?,?,?,?,?,?,?,100156AB), ref: 100013BF
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,DF9D727A,?,?,?,1001885B,000000FF), ref: 1000124D
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,1001885B,000000FF), ref: 10001266
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,1001885B,000000FF), ref: 10001273
                                                                                                                                                                                                                              • DeleteCriticalSection.KERNEL32(10020350,?,?,?,1001885B,000000FF), ref: 10001284
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,1001885B,000000FF), ref: 10001295
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$CloseHandle$DeleteEnterEventLeaveObjectSingleWait
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2474944948-0
                                                                                                                                                                                                                              • Opcode ID: 1e9d32bd37262b913d57dc8945bf0fb53b1a93de7becb73826e872e3e5311905
                                                                                                                                                                                                                              • Instruction ID: 64c5f76c38a82e9d846c98533c0514a9f92b4564d6453463f8853accf3b8306c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1e9d32bd37262b913d57dc8945bf0fb53b1a93de7becb73826e872e3e5311905
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E2015B71504760DFE750DF28CC88A4A77A9EB48730F608B09F439D76E1D734AA418B61
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __lock.LIBCMT ref: 10007B4D
                                                                                                                                                                                                                                • Part of subcall function 10009513: __mtinitlocknum.LIBCMT ref: 10009527
                                                                                                                                                                                                                                • Part of subcall function 10009513: __amsg_exit.LIBCMT ref: 10009533
                                                                                                                                                                                                                                • Part of subcall function 10009513: EnterCriticalSection.KERNEL32(?,?,?,1000F77D,00000004,1001B950,0000000C,1000B1A8,?,?,00000000,00000000,00000000,1000AB20,00000001,00000214), ref: 1000953B
                                                                                                                                                                                                                              • ___sbh_find_block.LIBCMT ref: 10007B58
                                                                                                                                                                                                                              • ___sbh_free_block.LIBCMT ref: 10007B67
                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000,00000001,1001B588,0000000C,100094F4,00000000,1001B628,0000000C,1000952C,00000001,?,?,1000F77D,00000004,1001B950,0000000C), ref: 10007B97
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,1000F77D,00000004,1001B950,0000000C,1000B1A8,?,?,00000000,00000000,00000000,1000AB20,00000001,00000214), ref: 10007BA8
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2714421763-0
                                                                                                                                                                                                                              • Opcode ID: a001902257452df3a09ef7874541bacfe911b9a4d4b91542b9a5e470de5e31ec
                                                                                                                                                                                                                              • Instruction ID: 4bde7f342c64e4d2018f3ae2fc3c74ed1e6debbda6c59ac2aa0521a4ba985f47
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a001902257452df3a09ef7874541bacfe911b9a4d4b91542b9a5e470de5e31ec
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8501D639C00715AAFB21DBB18C09B5E36A4FF003E1F204209F518A6098CF3CEA40CB65
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __lock.LIBCMT ref: 00404057
                                                                                                                                                                                                                                • Part of subcall function 00402D12: __mtinitlocknum.LIBCMT ref: 00402D26
                                                                                                                                                                                                                                • Part of subcall function 00402D12: __amsg_exit.LIBCMT ref: 00402D32
                                                                                                                                                                                                                                • Part of subcall function 00402D12: EnterCriticalSection.KERNEL32(?,?,?,00405EA1,00000004,00409600,0000000C,0040411A,?,?,00000000,00000000,00000000,004024F8,00000001,00000214), ref: 00402D3A
                                                                                                                                                                                                                              • ___sbh_find_block.LIBCMT ref: 00404062
                                                                                                                                                                                                                              • ___sbh_free_block.LIBCMT ref: 00404071
                                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000,?,00409580,0000000C,00402CF3,00000000,004094A0,0000000C,00402D2B,?,?,?,00405EA1,00000004,00409600,0000000C), ref: 004040A1
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00405EA1,00000004,00409600,0000000C,0040411A,?,?,00000000,00000000,00000000,004024F8,00000001,00000214), ref: 004040B2
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2714421763-0
                                                                                                                                                                                                                              • Opcode ID: c53e33b7dcff97c89c7848c55f26829c9334c78826d435bd8598ab40913ee6d4
                                                                                                                                                                                                                              • Instruction ID: bb3a9ea6063299376b196d4342a46263de040b943687fa37fdfcb015542456c3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c53e33b7dcff97c89c7848c55f26829c9334c78826d435bd8598ab40913ee6d4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 540184B2941301AADB207BB29E0AB5E37649F80324F10423FF7047A2D2CB7C89449A9C
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014426
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001443C
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201B8,?,00000004,?,00000010,?,00000000), ref: 1001446F
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014484
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: d5d1587f7f7b2bd1b6f3903fe53ac465cdd8ad77325049dbc3963d326160d6bd
                                                                                                                                                                                                                              • Instruction ID: a8c769179fd60e2bf6cd89700ffbf8ba4d12cccd7724cdc3fecdfc68b2935979
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d5d1587f7f7b2bd1b6f3903fe53ac465cdd8ad77325049dbc3963d326160d6bd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 58F03C74214311AFE314DBA49D84B6633DAEF88B61F628608F666C94E1DB70C884DA62
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014548
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014575
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201B0,?,0000000C,00000000,00000000,00000000,00000000), ref: 1001459C
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100145AB
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: cf9b4901ff1e343b7e26287a133ebef74e919893ac441ab88bcd06e640e03855
                                                                                                                                                                                                                              • Instruction ID: 0eff3ab3fb06489d6740a8c9915ab30779d44775857bedc5cb99c14d77079b55
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cf9b4901ff1e343b7e26287a133ebef74e919893ac441ab88bcd06e640e03855
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 73016774514311AFE301DF28CD45B5A77E5EF98B10F918A08F964862E2E774D5048A52
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100145D8
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014605
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201AC,?,0000000C,00000000,00000000,00000000,00000000), ref: 1001462C
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001463B
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: 6e4f1e0d7d0e21a89da46d87f902386311073b00f14cfb2b082e5294dee19481
                                                                                                                                                                                                                              • Instruction ID: 42d7f987a94a52d01ef36b35c772b808b674778ff1b5ba1bc601a11ad0b11856
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6e4f1e0d7d0e21a89da46d87f902386311073b00f14cfb2b082e5294dee19481
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6A016274A14311AFF300DF28CD85B5A77E5EF98B10F918A08F968862E2E774D5088A92
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020458,0000000A,?,00000000,1001783B), ref: 100038FE
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020458), ref: 1000392C
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,00002710), ref: 1000393A
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020458), ref: 10003941
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020458), ref: 10003963
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$EnterLeave$ObjectSingleWait
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1755037574-0
                                                                                                                                                                                                                              • Opcode ID: 3bb25a39c071496a06b616590bfd4f65b77da877f5bd338bfbeae23c9fbe291f
                                                                                                                                                                                                                              • Instruction ID: 4c8c2d80ac1b079380655c5ec4cbb732bc282f0004f1aa78e3f82d5ff21842fc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3bb25a39c071496a06b616590bfd4f65b77da877f5bd338bfbeae23c9fbe291f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8FF090B1B402655FF704FB98ECD0CA533EAEBCC354760C019FB0593613CA7068069B61
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(100203D8,0000000A,?,00000000,10017836), ref: 10002E7E
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(100203D8), ref: 10002EAC
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,00002710), ref: 10002EBA
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(100203D8), ref: 10002EC1
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(100203D8), ref: 10002EE3
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$EnterLeave$ObjectSingleWait
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1755037574-0
                                                                                                                                                                                                                              • Opcode ID: 1c097af206b97876061b063052c6263d78874f6a138238f18bb0d2092e23d612
                                                                                                                                                                                                                              • Instruction ID: e43171a4669c4619fb34f8ae264f673014ca4388743921c5762645a7f44c2943
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1c097af206b97876061b063052c6263d78874f6a138238f18bb0d2092e23d612
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 66F03A757103249FF304D7A8DCD0CA973AEEBC8794764405AF741A3226C7B4BA428B61
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 10014666
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001467B
                                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(FFFFFFFF,002201A8,?,00000004,00000000,00000000,?,00000000), ref: 100146A0
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100146AF
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$ControlDeviceEnter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3744975357-0
                                                                                                                                                                                                                              • Opcode ID: 1ae83451541ad7b1658e7e77a32fbb5fc71b43354f710eefe43c36ccfaec8dcc
                                                                                                                                                                                                                              • Instruction ID: 3db9b80ac07a141cc6bafe2479cacd36b1aa32743546a89e3ddafa96da967a27
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1ae83451541ad7b1658e7e77a32fbb5fc71b43354f710eefe43c36ccfaec8dcc
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 84F08270251310AFF201C7749C89F553399DF48B22F628708F326C90E1DF70D4049A51
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __snprintf.LIBCMT ref: 100131DB
                                                                                                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00000001), ref: 100131F5
                                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 1001321A
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • SYSTEM\CurrentControlSet\Services\%s, xrefs: 100131CC
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseOpen__snprintf
                                                                                                                                                                                                                              • String ID: SYSTEM\CurrentControlSet\Services\%s
                                                                                                                                                                                                                              • API String ID: 2649323954-2757632955
                                                                                                                                                                                                                              • Opcode ID: 84ec4fc234ded0ec1746a26bb0a01dea6608cb65e603b7f2fafd6f762602d5c4
                                                                                                                                                                                                                              • Instruction ID: 0e6c5bb0a140b4fe4a8a9fd12908ebb5e2cd1ecdda7a5af6ef08cdde4ffb9b5c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 84ec4fc234ded0ec1746a26bb0a01dea6608cb65e603b7f2fafd6f762602d5c4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 37F0E6B5A143005BF764DB54C856FEA73E5EB99700F80480CF5D986181DAB59584CA52
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32,QueryFullProcessImageNameW), ref: 100189EA
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 100189F1
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: QueryFullProcessImageNameW$kernel32
                                                                                                                                                                                                                              • API String ID: 1646373207-4169370628
                                                                                                                                                                                                                              • Opcode ID: 80ead79f867b9c70acc418535677702e5c57cb3ae286bb14f1603a2e4be25d81
                                                                                                                                                                                                                              • Instruction ID: d4b750a60ec6c6cb5d585284b623d2f8c151284af6f3ea71f4c867148f187fbc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 80ead79f867b9c70acc418535677702e5c57cb3ae286bb14f1603a2e4be25d81
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7BB092B8400320AFEB01DBE08C8C8953AEEE74E2027008400F60585120CB30C1E0CF15
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32,QueryFullProcessImageNameA), ref: 10018A0A
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 10018A11
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: QueryFullProcessImageNameA$kernel32
                                                                                                                                                                                                                              • API String ID: 1646373207-3526589867
                                                                                                                                                                                                                              • Opcode ID: bfb67a8b5cc4ef26928f28fcb801f94734c3672f5e5d78a8aa3062b54429a572
                                                                                                                                                                                                                              • Instruction ID: 98f50a63cd48d57722deb6357d66e02bf387ff61662be34999bf1d136a449764
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bfb67a8b5cc4ef26928f28fcb801f94734c3672f5e5d78a8aa3062b54429a572
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FAB092F14013209FE702ABB08C8C8853AE9EB1A202B108100FB0186121CB38C0D18A12
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(ntdll,NtQuerySymbolicLinkObject), ref: 10018A5A
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 10018A61
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: NtQuerySymbolicLinkObject$ntdll
                                                                                                                                                                                                                              • API String ID: 1646373207-3146753317
                                                                                                                                                                                                                              • Opcode ID: 61b53181ddc3a0468bf9acf94f72e8e6d06d1798f52acba3e2d3b8d08e6a28da
                                                                                                                                                                                                                              • Instruction ID: b543b7ade083403f1789f1f0de2ce02b86dca8d31286e88a7640a01fa307330f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 61b53181ddc3a0468bf9acf94f72e8e6d06d1798f52acba3e2d3b8d08e6a28da
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B4B092F0400320AFE701EBA18C8C8863AEAE70A2223008010F70585125CB34C1D48F11
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(ntdll,NtOpenSymbolicLinkObject), ref: 10018A7A
                                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 10018A81
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                                                                                                              • String ID: NtOpenSymbolicLinkObject$ntdll
                                                                                                                                                                                                                              • API String ID: 1646373207-699678798
                                                                                                                                                                                                                              • Opcode ID: fdd8a5cfbd6b08d661b471b0597a721e8dc6ba82253e6c59f24492ff2366b510
                                                                                                                                                                                                                              • Instruction ID: ebc436c54efd9b5b1c1cf879c4817285fbe182f6251ddbece40f41faf484d1d2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fdd8a5cfbd6b08d661b471b0597a721e8dc6ba82253e6c59f24492ff2366b510
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 07B092F14403219FE702EBA08D8C8863AEAE70E2037008015F70185122CB34C0D1CA11
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 10015CBC
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10015CD8
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015D3B
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: 31d074460ceac946c0d193caf96497102455dab9f53a976f00f18180bc0b4a95
                                                                                                                                                                                                                              • Instruction ID: 6b063e24d70fe8b42fc37b21e784bd8b66a1ec8045d673d45357853a068beb0b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 31d074460ceac946c0d193caf96497102455dab9f53a976f00f18180bc0b4a95
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B861AA76905700CFC314CF28D980A5AB7F6FB88661F548A2DF9598B341D736EA44CBA2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 1001540F
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10015423
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001546A
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: f884fb650ff68b9350361ec3a5e3420faf4578eaab12f6148c9d3cfc54674c03
                                                                                                                                                                                                                              • Instruction ID: 3b9cdc21f64611186a4f192bef5eff766ae51078ef50db3d8a9c348abcb55b80
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f884fb650ff68b9350361ec3a5e3420faf4578eaab12f6148c9d3cfc54674c03
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2531D1756007149BC710CF2DEC8499A77E5EF88336F10432AF95D8B691D731E9848BD0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168,00000010,00000000,10015376), ref: 10017D12
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10017D7B
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10017DAE
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10017DC5
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168), ref: 10017DCE
                                                                                                                                                                                                                                • Part of subcall function 10007B2F: __lock.LIBCMT ref: 10007B4D
                                                                                                                                                                                                                                • Part of subcall function 10007B2F: ___sbh_find_block.LIBCMT ref: 10007B58
                                                                                                                                                                                                                                • Part of subcall function 10007B2F: ___sbh_free_block.LIBCMT ref: 10007B67
                                                                                                                                                                                                                                • Part of subcall function 10007B2F: HeapFree.KERNEL32(00000000,00000001,1001B588,0000000C,100094F4,00000000,1001B628,0000000C,1000952C,00000001,?,?,1000F77D,00000004,1001B950,0000000C), ref: 10007B97
                                                                                                                                                                                                                                • Part of subcall function 10007B2F: GetLastError.KERNEL32(?,1000F77D,00000004,1001B950,0000000C,1000B1A8,?,?,00000000,00000000,00000000,1000AB20,00000001,00000214), ref: 10007BA8
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$EnterErrorFreeHeapLast___sbh_find_block___sbh_free_block__lock
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2683178029-0
                                                                                                                                                                                                                              • Opcode ID: 745b44e389e3eb57d002cadd99901bb83912b5949676a4bdb36c585caf9445f7
                                                                                                                                                                                                                              • Instruction ID: b4225b4be6f6f7a218a50a7cc17e3f5341257b43a51e5c7c058e521d2863d70b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 745b44e389e3eb57d002cadd99901bb83912b5949676a4bdb36c585caf9445f7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C5219D765003158FD755CF14ED45AAA77B1FF9431570244BEF909CB222DB36D492CB81
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 100142CD
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100142E1
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100142FE
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: 91475d05e9af95ed88a2ca98d537037db2de0cf6f2e51c315e4e122b3160fcb0
                                                                                                                                                                                                                              • Instruction ID: 0688acbf623d954f04115705206b7a5878359c5d24a5a52100af0231af46e52b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 91475d05e9af95ed88a2ca98d537037db2de0cf6f2e51c315e4e122b3160fcb0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F411A0356102159FC700CF2DEC4489577AAEF89231712835AFD2C877A1EB31E8508AD0
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 1001437D
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014391
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 100143AE
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: af989e02686470c58158b9f9546e3ca7512020e02bc5ed8235ce539b5489efd8
                                                                                                                                                                                                                              • Instruction ID: 4d93d7c43a49986c58b60d74623ea931e304e01d20275fc7b50258dea019b724
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: af989e02686470c58158b9f9546e3ca7512020e02bc5ed8235ce539b5489efd8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2F11A0396102149FC700CF6DEC4489977A9EF88231711835AFD2CC77A1EB31E9118AD1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 1001480D
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014821
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001483E
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: 5b0c05bd3bb3b5db66ab5481f23a3e4c1540d4302acacb0ddc367f69b30fcab4
                                                                                                                                                                                                                              • Instruction ID: 77183064e41a1e9205efc12c9dcf8d440c153a8ee4ed2ed3b95b76763cc59ffb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5b0c05bd3bb3b5db66ab5481f23a3e4c1540d4302acacb0ddc367f69b30fcab4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8401B5366102149FD701DF7CAC04899379AEB89632B114366FE2C872E1DF31D95586D1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(1002030C), ref: 1001476D
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 10014781
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(1002030C), ref: 1001479E
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$Leave$Enter
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2978645861-0
                                                                                                                                                                                                                              • Opcode ID: 315757dbfcfbb32eb6690a5904ae741756b3478989afcffcdb4784ba547c2fca
                                                                                                                                                                                                                              • Instruction ID: c8b4f41cc937fb26e74b5d9e0f7055d815144c6c2631823094905784c4cc0ea4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 315757dbfcfbb32eb6690a5904ae741756b3478989afcffcdb4784ba547c2fca
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0D01F5366242148FD700DB7CAC44499339AEF89231B124356FE3C872E1DF31D91186D1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 10010B83
                                                                                                                                                                                                                              • __isleadbyte_l.LIBCMT ref: 10010BB7
                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,FF000002,?,00000000,?,?,?,1000FF83,?,?,00000001), ref: 10010BE8
                                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,?,00000000,?,?,?,1000FF83,?,?,00000001), ref: 10010C56
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3058430110-0
                                                                                                                                                                                                                              • Opcode ID: d976dae8849e1df09a0b0c0d7ef9455a66fad74b5674ac6a6004c55bf6a0fbc5
                                                                                                                                                                                                                              • Instruction ID: a1dc6150c0cefba4fc0e341efb8d7f9e4622e53aa43daf027c921bb7a998826d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d976dae8849e1df09a0b0c0d7ef9455a66fad74b5674ac6a6004c55bf6a0fbc5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B0319D31B08246EFDB10DFA4C8849AA7BE5FF00255F1586A9F4A08F1A1D3B0D9C0DB51
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,0000000A,759230B0,00000000,?,76EBFFB0,10017857), ref: 100014D0
                                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,76EBFFB0,10017857), ref: 1000150F
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,000000FF,?,76EBFFB0,10017857), ref: 10001522
                                                                                                                                                                                                                              • _memmove_s.LIBCMT ref: 10001573
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseEventHandleObjectSingleWait_memmove_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3037655736-0
                                                                                                                                                                                                                              • Opcode ID: a16a9262e8a1ed26482d417ee0d5e11f3f8b9f0b5b5de5088259525e283d6dc5
                                                                                                                                                                                                                              • Instruction ID: c65eb985cd46562ea4b9b3fa780de754e17b39af8a735433f2001fa7709411ec
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a16a9262e8a1ed26482d417ee0d5e11f3f8b9f0b5b5de5088259525e283d6dc5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1D217171904A028FB730EB59C88545EB3E6FBC4691711851DE5AB47559DB30FE808BA1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __calloc_crt.LIBCMT ref: 10007E6E
                                                                                                                                                                                                                              • CreateThread.KERNEL32(?,?,10007DB3,00000000,?,?), ref: 10007EB2
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00003001,?,?,10017A59,00000000,00000000,10017590,00000000,00000000,?,?,10017CBE), ref: 10007EBC
                                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 10007ED4
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CreateErrorLastThread__calloc_crt__dosmaperr
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 84609068-0
                                                                                                                                                                                                                              • Opcode ID: 96a702f07e20c8fc08ba84a89f2686319f8a34372d6dff5ac5e6610c97b7c4f9
                                                                                                                                                                                                                              • Instruction ID: 960ca24b8c0fd74316a4ffc7f982722606d32842def4c8c8f75851161ce74b88
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 96a702f07e20c8fc08ba84a89f2686319f8a34372d6dff5ac5e6610c97b7c4f9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B113636902249BFFB01EFA4DC8288E77E5FF083E0B214569F509A3095DB34AE018B60
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • DeleteCriticalSection.KERNEL32(100203D8,DF9D727A,?,?,?,?,1001875C,000000FF), ref: 10002B72
                                                                                                                                                                                                                                • Part of subcall function 100014C0: SetEvent.KERNEL32(?,0000000A,759230B0,00000000,?,76EBFFB0,10017857), ref: 100014D0
                                                                                                                                                                                                                                • Part of subcall function 100014C0: WaitForSingleObject.KERNEL32(?,000000FF,?,76EBFFB0,10017857), ref: 1000150F
                                                                                                                                                                                                                                • Part of subcall function 100014C0: CloseHandle.KERNEL32(?,?,000000FF,?,76EBFFB0,10017857), ref: 10001522
                                                                                                                                                                                                                                • Part of subcall function 100014C0: _memmove_s.LIBCMT ref: 10001573
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,1001875C,000000FF), ref: 10002B93
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,1001875C,000000FF), ref: 10002BAA
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,1001875C,000000FF), ref: 10002BE7
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseHandle$CriticalDeleteEventObjectSectionSingleWait_memmove_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3715746028-0
                                                                                                                                                                                                                              • Opcode ID: 76179a229a830d2f9d329135d3ac3756b66c2c4d1d0f11458de3c9b5cfab1ecf
                                                                                                                                                                                                                              • Instruction ID: cfe803f662d768d14c2dfa4e60897070c9f65bc5c6aa7f7d02d73ff30c3c2152
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 76179a229a830d2f9d329135d3ac3756b66c2c4d1d0f11458de3c9b5cfab1ecf
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 80217CB05043A18FF300DF688C8560A7BDEFB042B4FA04B19F465D72E7C779AA058B91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • DeleteCriticalSection.KERNEL32(10020458,DF9D727A,?,?,?,?,1001875C,000000FF), ref: 100035F2
                                                                                                                                                                                                                                • Part of subcall function 100014C0: SetEvent.KERNEL32(?,0000000A,759230B0,00000000,?,76EBFFB0,10017857), ref: 100014D0
                                                                                                                                                                                                                                • Part of subcall function 100014C0: WaitForSingleObject.KERNEL32(?,000000FF,?,76EBFFB0,10017857), ref: 1000150F
                                                                                                                                                                                                                                • Part of subcall function 100014C0: CloseHandle.KERNEL32(?,?,000000FF,?,76EBFFB0,10017857), ref: 10001522
                                                                                                                                                                                                                                • Part of subcall function 100014C0: _memmove_s.LIBCMT ref: 10001573
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,1001875C,000000FF), ref: 10003613
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,1001875C,000000FF), ref: 1000362A
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,1001875C,000000FF), ref: 10003667
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseHandle$CriticalDeleteEventObjectSectionSingleWait_memmove_s
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3715746028-0
                                                                                                                                                                                                                              • Opcode ID: 63cec45596fa0ece01aef7757e97c95d257c6fcde774a1e3c521d25e9a1047f9
                                                                                                                                                                                                                              • Instruction ID: e4b86ddf39c1be931d4e7214d39989b71f3d296ab9120b50707eace9ea249c52
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 63cec45596fa0ece01aef7757e97c95d257c6fcde774a1e3c521d25e9a1047f9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9621A1F49043919FE310EF6C8C8860A7BDAF704274FE08719F565872E7C739A9058BA2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,10018648,000000FF), ref: 1000337E
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,10018648,000000FF), ref: 100033BD
                                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 100033CF
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 100033D2
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalEventSection$EnterLeave
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 2034477713-0
                                                                                                                                                                                                                              • Opcode ID: 26d7926c99e25f810d7718daa53f3b713310baac375bc8a9718a81a7c18c5246
                                                                                                                                                                                                                              • Instruction ID: e5964f4e11a61a5ceb4984cd574a80e3950d02b8ad30e80ede868aa41323114b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 26d7926c99e25f810d7718daa53f3b713310baac375bc8a9718a81a7c18c5246
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A5119D71504B44DFD321CF25C884B5BB7E8FB48260F008A2AE49A83A90DB79FA44CB91
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(10020168,?,?,1001533B), ref: 10017DFF
                                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(10020168,?,1001533B), ref: 10017E29
                                                                                                                                                                                                                              • _malloc.LIBCMT ref: 10017E33
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CriticalSection$EnterLeave_malloc
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 4242827099-0
                                                                                                                                                                                                                              • Opcode ID: d9080a10b4345808967dd27d92c9b69f056f69c068306372603454a2a88374c5
                                                                                                                                                                                                                              • Instruction ID: 61feaa6bcb75b8102a09506a810e75e671a35ffd5e85a93e1235847fc3054c73
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d9080a10b4345808967dd27d92c9b69f056f69c068306372603454a2a88374c5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 66118276A002138BD755CB2CFD4199673F6FFD42A035582BEE80DCB225EA31DC918B80
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 1000AB6E: __amsg_exit.LIBCMT ref: 1000AB7C
                                                                                                                                                                                                                              • __amsg_exit.LIBCMT ref: 1000F279
                                                                                                                                                                                                                              • __lock.LIBCMT ref: 1000F289
                                                                                                                                                                                                                              • InterlockedDecrement.KERNEL32(?), ref: 1000F2A6
                                                                                                                                                                                                                              • InterlockedIncrement.KERNEL32(005C16B8), ref: 1000F2D1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 4129207761-0
                                                                                                                                                                                                                              • Opcode ID: 688ec18e88f5c39b8294586d72f857720aa36dea6ca6f4b7078c97f8e49bdce4
                                                                                                                                                                                                                              • Instruction ID: fffc615c0fb4f66862dac9a19bb85b947d9e820b5dc1b207d8f39025125812c1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 688ec18e88f5c39b8294586d72f857720aa36dea6ca6f4b7078c97f8e49bdce4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AE01923AD01762ABFB11DB64884576DB3A0FF057E0F118109F80067A89CB38BD81EBD5
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 00402546: __amsg_exit.LIBCMT ref: 00402554
                                                                                                                                                                                                                              • __amsg_exit.LIBCMT ref: 00403BB6
                                                                                                                                                                                                                              • __lock.LIBCMT ref: 00403BC6
                                                                                                                                                                                                                              • InterlockedDecrement.KERNEL32(?), ref: 00403BE3
                                                                                                                                                                                                                              • InterlockedIncrement.KERNEL32(009816C0), ref: 00403C0E
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 4129207761-0
                                                                                                                                                                                                                              • Opcode ID: 52a3e7971e82fb72f830ee4ccc85c939e43fcece51e1a5e76106840384332467
                                                                                                                                                                                                                              • Instruction ID: 4c552d2baa94243f91659daba1be32444af7e91f1612fcd78746f7470628c05b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 52a3e7971e82fb72f830ee4ccc85c939e43fcece51e1a5e76106840384332467
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8B01A532900721ABD711BF269906B5ABF74AB00759F14403BE800772D2CB7CAE81DB9E
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetLastError.KERNEL32(00000001,00000000,10009235,1000A326,00000001,1000A856,00000000,00000000,00000001,?,?,?,1000A968,?,1000ACF2,00000000), ref: 1000AAF9
                                                                                                                                                                                                                                • Part of subcall function 1000A9B0: TlsGetValue.KERNEL32(00000000,1000AB0C,?,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001), ref: 1000A9B7
                                                                                                                                                                                                                                • Part of subcall function 1000A9B0: TlsSetValue.KERNEL32(00000000,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27), ref: 1000A9D8
                                                                                                                                                                                                                              • __calloc_crt.LIBCMT ref: 1000AB1B
                                                                                                                                                                                                                                • Part of subcall function 1000B195: __calloc_impl.LIBCMT ref: 1000B1A3
                                                                                                                                                                                                                                • Part of subcall function 1000B195: Sleep.KERNEL32(00000000), ref: 1000B1BA
                                                                                                                                                                                                                                • Part of subcall function 1000A91E: TlsGetValue.KERNEL32(?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001,?,?,1001B608), ref: 1000A92B
                                                                                                                                                                                                                                • Part of subcall function 1000A91E: TlsGetValue.KERNEL32(00000002,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27,00000001), ref: 1000A942
                                                                                                                                                                                                                                • Part of subcall function 1000AA38: GetModuleHandleA.KERNEL32(KERNEL32.DLL,1001B668,0000000C,1000AB49,00000000,00000000,?,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000), ref: 1000AA49
                                                                                                                                                                                                                                • Part of subcall function 1000AA38: GetProcAddress.KERNEL32(?,EncodePointer), ref: 1000AA7D
                                                                                                                                                                                                                                • Part of subcall function 1000AA38: GetProcAddress.KERNEL32(?,DecodePointer), ref: 1000AA8D
                                                                                                                                                                                                                                • Part of subcall function 1000AA38: InterlockedIncrement.KERNEL32(1001E5E0), ref: 1000AAAF
                                                                                                                                                                                                                                • Part of subcall function 1000AA38: __lock.LIBCMT ref: 1000AAB7
                                                                                                                                                                                                                                • Part of subcall function 1000AA38: ___addlocaleref.LIBCMT ref: 1000AAD6
                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 1000AB4B
                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001), ref: 1000AB63
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1081334783-0
                                                                                                                                                                                                                              • Opcode ID: 47baad0c142978dd281d06efe9ff58a8f45b381e9549035b39ead8b204b2342f
                                                                                                                                                                                                                              • Instruction ID: 6fb4e631f38a478814a727dc28711fd6a3486464b3ce86ddb14d750e3725a89c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 47baad0c142978dd281d06efe9ff58a8f45b381e9549035b39ead8b204b2342f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0BF028329016325EF726AB746C09B9E3A91DF067F07118318F540D70E5CF34DC808690
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,0040199A), ref: 004024D1
                                                                                                                                                                                                                                • Part of subcall function 004023A1: TlsGetValue.KERNEL32(?,004024E4,?,?,0040199A), ref: 004023A8
                                                                                                                                                                                                                                • Part of subcall function 004023A1: TlsSetValue.KERNEL32(00000000,004024E4,?,?,0040199A), ref: 004023C9
                                                                                                                                                                                                                              • __calloc_crt.LIBCMT ref: 004024F3
                                                                                                                                                                                                                                • Part of subcall function 00404107: __calloc_impl.LIBCMT ref: 00404115
                                                                                                                                                                                                                                • Part of subcall function 00404107: Sleep.KERNEL32(00000000), ref: 0040412C
                                                                                                                                                                                                                                • Part of subcall function 0040232A: TlsGetValue.KERNEL32(00000000,004023BF,?,004024E4,?,?,0040199A), ref: 00402337
                                                                                                                                                                                                                                • Part of subcall function 0040232A: TlsGetValue.KERNEL32(00000006,?,004024E4,?,?,0040199A), ref: 0040234E
                                                                                                                                                                                                                                • Part of subcall function 00402410: GetModuleHandleA.KERNEL32(KERNEL32.DLL,00409438,0000000C,00402521,00000000,00000000,?,?,0040199A), ref: 00402421
                                                                                                                                                                                                                                • Part of subcall function 00402410: GetProcAddress.KERNEL32(?,EncodePointer), ref: 00402455
                                                                                                                                                                                                                                • Part of subcall function 00402410: GetProcAddress.KERNEL32(?,DecodePointer), ref: 00402465
                                                                                                                                                                                                                                • Part of subcall function 00402410: InterlockedIncrement.KERNEL32(0040A460), ref: 00402487
                                                                                                                                                                                                                                • Part of subcall function 00402410: __lock.LIBCMT ref: 0040248F
                                                                                                                                                                                                                                • Part of subcall function 00402410: ___addlocaleref.LIBCMT ref: 004024AE
                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00402523
                                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,0040199A), ref: 0040253B
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2406935891.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406895102.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2406977537.0000000000408000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407008193.000000000040A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407030372.000000000040C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_400000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 1081334783-0
                                                                                                                                                                                                                              • Opcode ID: 5ab9714a243f0ffc41694fcd0ac968f58e359ad798ea549c5e95678d0f806d4d
                                                                                                                                                                                                                              • Instruction ID: 6e150c00b90b0de194aaa4e6d30466842cabbf0b81775d3192f362ebb9054922
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5ab9714a243f0ffc41694fcd0ac968f58e359ad798ea549c5e95678d0f806d4d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B3F0F432000621AAC63227757E0D64B2B50AF50775B21413EF985B61E1CEB88940869D
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 10013A8F
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10013AB5
                                                                                                                                                                                                                              • GetModuleFileNameExW.PSAPI(00000000,00000000,?,?), ref: 10013ACD
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?), ref: 10013AD5
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseHandle$FileModuleNameOpenProcess
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3706008839-0
                                                                                                                                                                                                                              • Opcode ID: 77a01a2355183141ac97614d7ed4b7053512745596251045c5cd6b166a56d9cf
                                                                                                                                                                                                                              • Instruction ID: 9d03786ab276ef560676e71944a6f241f9687970605c8b5740b5995641b249e1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 77a01a2355183141ac97614d7ed4b7053512745596251045c5cd6b166a56d9cf
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BEF090363042216FE211CB6AEC88D6F37EDEFC9A11B054818F544C3200DA30DC0AC6B2
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 10013AEF
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10013B15
                                                                                                                                                                                                                              • GetModuleFileNameExA.PSAPI(00000000,00000000,?,?), ref: 10013B2D
                                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?), ref: 10013B35
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: CloseHandle$FileModuleNameOpenProcess
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3706008839-0
                                                                                                                                                                                                                              • Opcode ID: 8cc178218c7d8c3221216592da3333f16c171a7615b685b5cff0377258111b15
                                                                                                                                                                                                                              • Instruction ID: 8e40d057b3745753bf0ea22a452f5ad3ee9e323a75b10f58dd7a4a987a81d136
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8cc178218c7d8c3221216592da3333f16c171a7615b685b5cff0377258111b15
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00F06D763053616BE211DB29EC88E6B37A9EBC9A11B054919F604C3200DB30EC4AC6B1
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                                • Part of subcall function 1000A9B0: TlsGetValue.KERNEL32(00000000,1000AB0C,?,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001), ref: 1000A9B7
                                                                                                                                                                                                                                • Part of subcall function 1000A9B0: TlsSetValue.KERNEL32(00000000,?,?,1000A968,?,1000ACF2,00000000,00000000,10008BC3,00000000,?,?,00000001,?,?,10008C27), ref: 1000A9D8
                                                                                                                                                                                                                                • Part of subcall function 1000A995: TlsGetValue.KERNEL32(?,10007DC4,00000000), ref: 1000A99F
                                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 10007DDC
                                                                                                                                                                                                                              • ExitThread.KERNEL32 ref: 10007DE3
                                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 10007DE9
                                                                                                                                                                                                                              • __freefls@4.LIBCMT ref: 10007E0A
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: Value$Thread$CurrentErrorExitLast__freefls@4
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID: 3657912857-0
                                                                                                                                                                                                                              • Opcode ID: 64a50246a69103428987866c6c5c24afc67ad888acb03d37522b74bef4819570
                                                                                                                                                                                                                              • Instruction ID: 77834a4035ff60ce0f3138a5f24efa19d5a290510d67734f4d47669ef0895791
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 64a50246a69103428987866c6c5c24afc67ad888acb03d37522b74bef4819570
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CC01D67C9016519FF305EB70CC48A4E37F9FF492C0B228569F9098712ADB38E882CB52
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • __EH_prolog3.LIBCMT ref: 10007AF7
                                                                                                                                                                                                                              • __CxxThrowException@8.LIBCMT ref: 10007B29
                                                                                                                                                                                                                                • Part of subcall function 10008D7B: RaiseException.KERNEL32(?,?,10008876,?,?,?,?,?,10008876,?,1001BB8C,1001F1E4), ref: 10008DBB
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • invalid string position, xrefs: 10007AFC
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000019.00000002.2407428257.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407398545.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407457416.0000000010019000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407486723.000000001001E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              • Associated: 00000019.00000002.2407543255.0000000010022000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_25_2_10000000_nfregdrv.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                                                                                                                                                                                              • String ID: invalid string position
                                                                                                                                                                                                                              • API String ID: 1961742612-1799206989
                                                                                                                                                                                                                              • Opcode ID: 65eb9927a461a61c6ced63933107e4e21b974b836ce3081774b1cc0b4902cc7c
                                                                                                                                                                                                                              • Instruction ID: d17f9ad7a6bda8f05d9bf2ec8c2e610a9defb4f0618d30455176f24681aaa848
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65eb9927a461a61c6ced63933107e4e21b974b836ce3081774b1cc0b4902cc7c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E1E0E275900458ABEB00DBD4CC45BDEB778FB18350F400129E245BB48AEFB8A688CB61

                                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                                              Execution Coverage:3.9%
                                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                                                              Signature Coverage:0%
                                                                                                                                                                                                                              Total number of Nodes:26
                                                                                                                                                                                                                              Total number of Limit Nodes:1
                                                                                                                                                                                                                              execution_graph 2240 1751180 2241 1751192 2240->2241 2244 1751114 2241->2244 2243 175124c 2246 175111f 2244->2246 2245 1751a35 2245->2243 2246->2245 2249 175143c 2246->2249 2248 1751afc 2248->2243 2250 1751447 2249->2250 2254 175143c OpenSCManagerW 2250->2254 2256 1751aff 2250->2256 2251 1751b60 2263 17514e0 2251->2263 2253 1751b79 2253->2248 2254->2251 2257 1751b41 2256->2257 2261 175143c OpenSCManagerW 2257->2261 2262 1751aff OpenSCManagerW 2257->2262 2258 1751b60 2259 17514e0 OpenSCManagerW 2258->2259 2260 1751b79 2259->2260 2260->2251 2261->2258 2262->2258 2264 1751f10 OpenSCManagerW 2263->2264 2266 1751f98 2264->2266 2266->2253 2267 1751ae8 2268 1751af5 2267->2268 2269 175143c OpenSCManagerW 2268->2269 2270 1751afc 2269->2270

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 0 1751f08-1751f53 1 1751f55-1751f58 0->1 2 1751f5b-1751f5f 0->2 1->2 3 1751f67-1751f96 OpenSCManagerW 2->3 4 1751f61-1751f64 2->4 5 1751f9f-1751fbc 3->5 6 1751f98-1751f9e 3->6 4->3 6->5
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 01751F89
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000001D.00000002.2583250826.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_29_2_1750000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ManagerOpen
                                                                                                                                                                                                                              • String ID: ")DE
                                                                                                                                                                                                                              • API String ID: 1889721586-2386623192
                                                                                                                                                                                                                              • Opcode ID: 6786aeec4c8033a717af439e92c6ede4f3d9f788cc7ef2b4032d581115a51551
                                                                                                                                                                                                                              • Instruction ID: 6e79cd18e48162ba4d6a901b97fca356b1f31f1c6b05cafc06c0a1526b6e8155
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6786aeec4c8033a717af439e92c6ede4f3d9f788cc7ef2b4032d581115a51551
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 672154B6D013089FDB14CF9AC884ADEFBF5BF99310F14852EE819A7200C378A541CBA0

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 9 17514e0-1751f53 11 1751f55-1751f58 9->11 12 1751f5b-1751f5f 9->12 11->12 13 1751f67-1751f96 OpenSCManagerW 12->13 14 1751f61-1751f64 12->14 15 1751f9f-1751fbc 13->15 16 1751f98-1751f9e 13->16 14->13 16->15
                                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                              • OpenSCManagerW.SECHOST(00000000,00000000,?), ref: 01751F89
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 0000001D.00000002.2583250826.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_29_2_1750000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID: ManagerOpen
                                                                                                                                                                                                                              • String ID: ")DE
                                                                                                                                                                                                                              • API String ID: 1889721586-2386623192
                                                                                                                                                                                                                              • Opcode ID: 7aa407e409df9a19291c28d8d51d354e6d793ab8ca91f8fe78823a3504ef5a0e
                                                                                                                                                                                                                              • Instruction ID: 2ad8af7061a2872a239f9a887bf77fac6c57643749c7a5483121f306558cff19
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7aa407e409df9a19291c28d8d51d354e6d793ab8ca91f8fe78823a3504ef5a0e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 572152B58013089FDB10CF9AC884ADEFBF5FB58310F10852EE919A7240C3B8A544CBA0

                                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                                              Execution Coverage:9.8%
                                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:87.8%
                                                                                                                                                                                                                              Signature Coverage:4.1%
                                                                                                                                                                                                                              Total number of Nodes:74
                                                                                                                                                                                                                              Total number of Limit Nodes:7
                                                                                                                                                                                                                              execution_graph 60572 6322d10 60573 6322d5b CreateWindowExW 60572->60573 60575 6322dc5 60573->60575 60621 63222c0 60622 63222d2 60621->60622 60625 6323243 60622->60625 60626 6322339 60625->60626 60627 632324e 60625->60627 60628 6323297 60627->60628 60631 6323350 Shell_NotifyIconW 60627->60631 60634 6323343 60627->60634 60629 63232bc 60629->60628 60638 6323587 60629->60638 60645 6323598 60629->60645 60631->60629 60635 632334a 60634->60635 60636 6322634 Shell_NotifyIconW 60635->60636 60637 632339e 60636->60637 60639 63235b8 60638->60639 60640 6322634 Shell_NotifyIconW 60638->60640 60641 63235d9 60639->60641 60642 6323350 Shell_NotifyIconW 60639->60642 60640->60639 60643 63235f8 60641->60643 60644 6323350 Shell_NotifyIconW 60641->60644 60642->60641 60643->60628 60644->60643 60646 6322634 Shell_NotifyIconW 60645->60646 60647 63235b8 60646->60647 60648 63235d9 60647->60648 60649 6323350 Shell_NotifyIconW 60647->60649 60650 63235f8 60648->60650 60651 6323350 Shell_NotifyIconW 60648->60651 60649->60648 60650->60628 60651->60650 60576 632cf11 60578 632cf1a 60576->60578 60580 632d22f 60578->60580 60583 632d23d 60580->60583 60584 6323350 60583->60584 60585 6323383 60584->60585 60588 6322634 60585->60588 60589 63233f0 Shell_NotifyIconW 60588->60589 60591 63234ef 60589->60591 60591->60591 60553 2d227c8 60554 2d22829 CreateNamedPipeA 60553->60554 60556 2d2290b 60554->60556 60613 632b3d8 60614 632b3f7 60613->60614 60617 632ce3f 60614->60617 60618 632ce61 60617->60618 60619 6323350 Shell_NotifyIconW 60618->60619 60620 632b452 60619->60620 60600 c1b0040 60601 c1b005c 60600->60601 60602 c1b007d 60600->60602 60605 c1b01f8 60601->60605 60609 c1b01ec 60601->60609 60606 c1b024b LoadLibraryA 60605->60606 60608 c1b02de 60606->60608 60610 c1b024b LoadLibraryA 60609->60610 60612 c1b02de 60610->60612 60557 2d223ce 60559 2d223cf 60557->60559 60558 2d224b1 60559->60558 60562 2d22a08 60559->60562 60565 2d229f8 60559->60565 60568 2d21fd8 60562->60568 60566 2d22a15 60565->60566 60567 2d21fd8 ConnectNamedPipe 60565->60567 60566->60559 60567->60566 60569 2d22aa8 ConnectNamedPipe 60568->60569 60571 2d22b48 60569->60571 60592 2d2239d 60593 2d223aa 60592->60593 60595 2d223b5 60592->60595 60596 2d22a08 ConnectNamedPipe 60593->60596 60597 2d229f8 ConnectNamedPipe 60593->60597 60594 2d224b1 60595->60594 60598 2d22a08 ConnectNamedPipe 60595->60598 60599 2d229f8 ConnectNamedPipe 60595->60599 60596->60595 60597->60595 60598->60595 60599->60595

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 1005 bdf04a1-bdf04b5 1006 bdf04b7-bdf04c0 1005->1006 1007 bdf04c1-bdf050d 1005->1007 1013 bdf050f-bdf0518 1007->1013 1014 bdf0519-bdf05a2 1007->1014 1022 bdf05c9-bdf05cb 1014->1022 1023 bdf05a4-bdf05b3 1014->1023 1024 bdf05d1-bdf05fa 1022->1024 1023->1022 1026 bdf05b5-bdf05c7 1023->1026 1030 bdf05fc-bdf0606 1024->1030 1031 bdf0620-bdf0629 1024->1031 1026->1024 1030->1031 1032 bdf0608-bdf061e 1030->1032 1033 bdf062b-bdf0637 1031->1033 1034 bdf0651-bdf0659 1031->1034 1035 bdf065f-bdf0674 1032->1035 1033->1034 1036 bdf0639-bdf064f 1033->1036 1034->1035 1038 bdf067a-bdf0680 1035->1038 1039 bdf0676-bdf0678 1035->1039 1036->1035 1040 bdf0683-bdf068c 1038->1040 1039->1040 1042 bdf068e-bdf06ae 1040->1042 1043 bdf06b0-bdf06b2 1040->1043 1048 bdf06f0-bdf06f2 1042->1048 1044 bdf06b8 1043->1044 1045 bdf06b4-bdf06b6 1043->1045 1047 bdf06bb-bdf06c4 1044->1047 1045->1047 1052 bdf06de-bdf06ea 1047->1052 1053 bdf06c6-bdf06dc 1047->1053 1050 bdf070f-bdf0720 1048->1050 1051 bdf06f4-bdf070d 1048->1051 1058 bdf0728-bdf073c 1050->1058 1051->1058 1052->1048 1053->1048 1060 bdf08b4-bdf09b6 1058->1060 1061 bdf0742-bdf084f 1058->1061 1078 bdf09bc-bdf09c6 1060->1078 1079 bdf0ac1-bdf0ac3 1060->1079 1086 bdf0855-bdf085e 1061->1086 1087 bdf0851-bdf0853 1061->1087 1080 bdf09cc 1078->1080 1081 bdf09c8-bdf09ca 1078->1081 1082 bdf0aed-bdf0af5 1079->1082 1083 bdf0ac5-bdf0ae8 1079->1083 1085 bdf09d1-bdf09fa 1080->1085 1081->1085 1130 bdf0afa call bd6b3b0 1082->1130 1131 bdf0afa call bd6b3a1 1082->1131 1083->1082 1088 bdf09fc-bdf0a14 1085->1088 1089 bdf0a16-bdf0a3b 1085->1089 1091 bdf0867-bdf08af 1086->1091 1087->1091 1092 bdf0a3f-bdf0a60 1088->1092 1089->1092 1090 bdf0aff-bdf0b01 1093 bdf0b2d 1090->1093 1094 bdf0b03-bdf0b12 1090->1094 1091->1079 1102 bdf0a7c-bdf0a9b 1092->1102 1103 bdf0a62-bdf0a7a 1092->1103 1096 bdf0b32-bdf0b39 1093->1096 1094->1093 1107 bdf0b14-bdf0b2b 1094->1107 1099 bdf0b5e-bdf0b62 1096->1099 1100 bdf0b3b-bdf0b5c 1096->1100 1105 bdf0b64-bdf0b6e 1099->1105 1106 bdf0b70-bdf0b72 1099->1106 1115 bdf0b7f 1100->1115 1108 bdf0a9f-bdf0abb 1102->1108 1103->1108 1110 bdf0b77 1105->1110 1106->1110 1107->1096 1108->1079 1110->1115 1128 bdf0b82 call bd6c710 1115->1128 1129 bdf0b82 call bd6c720 1115->1129 1116 bdf0b87-bdf0ba0 1119 bdf0bb6-bdf0bc8 1116->1119 1120 bdf0ba2-bdf0bae 1116->1120 1121 bdf0bca-bdf0bcd 1119->1121 1122 bdf0bd0-bdf0bd2 1119->1122 1120->1119 1121->1122 1124 bdf0bda-bdf0bde 1122->1124 1125 bdf0bd4-bdf0bd7 1122->1125 1126 bdf0be6-bdf0bed 1124->1126 1127 bdf0be0-bdf0be3 1124->1127 1125->1124 1127->1126 1128->1116 1129->1116 1130->1090 1131->1090
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq$(aq$\;]q
                                                                                                                                                                                                                              • API String ID: 0-1792380333
                                                                                                                                                                                                                              • Opcode ID: 24037593946fd0bb4630c08f4c5988c3aedc8471d8d877c4588157657c8aa48e
                                                                                                                                                                                                                              • Instruction ID: 1d5eac911c97ce241b24787e7e6b4692478c44d7c9c4a17a78f4a58c14fe2917
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 24037593946fd0bb4630c08f4c5988c3aedc8471d8d877c4588157657c8aa48e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 05328F30A1461ACFDB14EF78C854A9DFBB2FF89310F1181A9D945AB351EB70EA85CB50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 38991529ef0a0aa5f7f16c26c2b16c74629d1ed588a7158bf8e8965fe77e6f87
                                                                                                                                                                                                                              • Instruction ID: 3b8bf0525674574e51ecd36036fc6cc17ef770ed60d6b7f7c94fc46a8633a425
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 38991529ef0a0aa5f7f16c26c2b16c74629d1ed588a7158bf8e8965fe77e6f87
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ABC12B71D006598FCB11CF68C8446CDFBB2BF85320F6A8295E858BB255DB70AD8ACF50
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3348680506.000000000BC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BC00000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bc00000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: $&^q$`]bq$`]bq$`]bq$`]bq$d>]q$d>]q$d>]q$d>]q
                                                                                                                                                                                                                              • API String ID: 0-3184770417
                                                                                                                                                                                                                              • Opcode ID: e7cc6e62a289fd368be33934bc9df4abdb7b472eaffd6576174e40e1ad046579
                                                                                                                                                                                                                              • Instruction ID: 706ee07ee9e1f9d1f0667174d82e2a28c3ba1257d288410334731cc256fe6c18
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e7cc6e62a289fd368be33934bc9df4abdb7b472eaffd6576174e40e1ad046579
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8702453172930DCFCB158FA9D850B6A7BA6EFC1221B1A846AD845CB2E1DF31CD45CB64

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 1132 bdfa808-bdfa833 1134 bdfa837-bdfa83d 1132->1134 1135 bdfa835 1132->1135 1136 bdfa83f-bdfa846 1134->1136 1137 bdfa875-bdfa879 1134->1137 1135->1134 1135->1136 1138 bdfa848-bdfa850 1136->1138 1139 bdfa857-bdfa86e 1136->1139 1138->1139 1140 bdfa87a-bdfa8db 1139->1140 1141 bdfa870 1139->1141 1144 bdfa8de-bdfa8ea 1140->1144 1141->1137 1145 bdfb08b-bdfb09e 1144->1145 1146 bdfa8f0-bdfa8f8 1144->1146 1147 bdfa8fa-bdfa8fc 1146->1147 1148 bdfa912-bdfa915 1146->1148 1149 bdfa8fe-bdfa901 1147->1149 1150 bdfa92b-bdfa934 1147->1150 1151 bdfa91b-bdfa91e 1148->1151 1152 bdfadf7-bdfae01 1148->1152 1155 bdfadd7-bdfadf2 1149->1155 1156 bdfa907-bdfa90a 1149->1156 1150->1144 1154 bdfa936-bdfa949 call bdf9c40 1150->1154 1151->1152 1158 bdfa924-bdfa927 1151->1158 1152->1145 1157 bdfae07-bdfae12 1152->1157 1169 bdfa94f 1154->1169 1170 bdfae32-bdfae7a 1154->1170 1155->1144 1162 bdfada9-bdfadd2 1156->1162 1163 bdfa910 1156->1163 1157->1144 1164 bdfae18-bdfae22 1157->1164 1159 bdfa929 1158->1159 1160 bdfa951-bdfa95d 1158->1160 1159->1144 1167 bdfa95f-bdfa96b 1160->1167 1168 bdfa96d 1160->1168 1162->1144 1163->1144 1171 bdfae2a-bdfae31 1164->1171 1172 bdfa972-bdfa974 1167->1172 1168->1172 1169->1144 1202 bdfae7c-bdfaea1 1170->1202 1203 bdfaea8-bdfaeee 1170->1203 1175 bdfa97a-bdfa98a 1172->1175 1176 bdfaef5-bdfaf37 1172->1176 1175->1145 1179 bdfa990-bdfa9a2 1175->1179 1207 bdfaf39-bdfaf5e 1176->1207 1208 bdfaf65-bdfafab 1176->1208 1181 bdfa9a8-bdfa9af 1179->1181 1182 bdfaa73-bdfaa7a 1179->1182 1186 bdfaa4f-bdfaa56 1181->1186 1187 bdfa9b5-bdfa9bc 1181->1187 1183 bdfaa9c-bdfaaa3 1182->1183 1184 bdfaa7c-bdfaa83 1182->1184 1192 bdfaaa5-bdfaaaf 1183->1192 1193 bdfaad0 1183->1193 1190 bdfaabc-bdfaac1 1184->1190 1191 bdfaa85-bdfaa8c 1184->1191 1189 bdfa9cb 1186->1189 1195 bdfaa5c-bdfaa63 1186->1195 1188 bdfa9be-bdfa9c5 1187->1188 1187->1189 1188->1189 1197 bdfafb2-bdfb00b 1188->1197 1198 bdfa9cf-bdfa9dd 1189->1198 1190->1198 1191->1197 1199 bdfaa92-bdfaa97 1191->1199 1192->1197 1200 bdfaab5 1192->1200 1193->1162 1196 bdfaa69-bdfaa6e 1195->1196 1195->1197 1196->1198 1231 bdfb03d-bdfb084 1197->1231 1232 bdfb00d-bdfb036 1197->1232 1210 bdfa9df-bdfaa08 1198->1210 1211 bdfaa37-bdfaa4a 1198->1211 1199->1198 1200->1190 1202->1203 1203->1176 1207->1208 1208->1197 1215 bdfaa1b-bdfaa34 1210->1215 1216 bdfaa0a-bdfaa0f 1210->1216 1211->1144 1215->1211 1216->1215 1231->1145 1232->1231
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq$(aq$(aq
                                                                                                                                                                                                                              • API String ID: 0-2593664646
                                                                                                                                                                                                                              • Opcode ID: 8803488619487ee111505552e071b1cf0d4e674a4b346024e34f6c87f49e5743
                                                                                                                                                                                                                              • Instruction ID: 8b11739458686dceb48c38c18d7495133241d1752ea3fd3240254dd45f18a6bd
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8803488619487ee111505552e071b1cf0d4e674a4b346024e34f6c87f49e5743
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8B025D70A046168FCB14DFA9C4906AEF7F2EF88310F21856AE94AE7350DB35DD42DB51

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 1409 bdf44a0-bdf44ab 1411 bdf44ac-bdf44b2 1409->1411 1412 bdf4438-bdf443a 1409->1412 1415 bdf44dc-bdf44e0 1411->1415 1416 bdf44b4-bdf44d5 1411->1416 1413 bdf445d-bdf446a 1412->1413 1414 bdf443c-bdf444a 1412->1414 1417 bdf444c 1414->1417 1418 bdf4456 1414->1418 1419 bdf44ec-bdf44fb 1415->1419 1420 bdf44e2-bdf44e4 1415->1420 1416->1415 1417->1418 1418->1413 1423 bdf44fd 1419->1423 1424 bdf4507-bdf4533 1419->1424 1420->1419 1423->1424 1427 bdf4539-bdf453f 1424->1427 1428 bdf4754-bdf476e 1424->1428 1429 bdf4608-bdf460c 1427->1429 1430 bdf4545-bdf454b 1427->1430 1441 bdf477b-bdf479f 1428->1441 1442 bdf4770-bdf4778 1428->1442 1433 bdf460e-bdf4617 1429->1433 1434 bdf4631-bdf463a 1429->1434 1430->1428 1432 bdf4551-bdf4560 1430->1432 1436 bdf45e7-bdf45f0 1432->1436 1437 bdf4566-bdf4572 1432->1437 1433->1428 1438 bdf461d-bdf462f 1433->1438 1439 bdf465f-bdf4662 1434->1439 1440 bdf463c-bdf4648 1434->1440 1436->1428 1445 bdf45f6-bdf4602 1436->1445 1437->1428 1443 bdf4578-bdf458f 1437->1443 1444 bdf4665-bdf466b 1438->1444 1439->1444 1452 bdf4650-bdf465c 1440->1452 1456 bdf47b5-bdf47c1 1441->1456 1457 bdf47a1 1441->1457 1442->1441 1448 bdf459b-bdf45ad 1443->1448 1449 bdf4591 1443->1449 1444->1428 1450 bdf4671-bdf4686 1444->1450 1445->1429 1445->1430 1448->1436 1459 bdf45af-bdf45b5 1448->1459 1449->1448 1450->1428 1451 bdf468c-bdf469e 1450->1451 1451->1428 1454 bdf46a4-bdf46b1 1451->1454 1452->1439 1454->1428 1458 bdf46b7-bdf46ce 1454->1458 1461 bdf47cd-bdf47e9 1456->1461 1462 bdf47c3 1456->1462 1460 bdf47a4-bdf47a6 1457->1460 1458->1428 1469 bdf46d4-bdf46ec 1458->1469 1463 bdf45b7 1459->1463 1464 bdf45c1-bdf45c7 1459->1464 1465 bdf47ea-bdf47fe 1460->1465 1466 bdf47a8-bdf47b3 1460->1466 1462->1461 1463->1464 1464->1428 1468 bdf45cd-bdf45e4 1464->1468 1474 bdf480b-bdf4827 1465->1474 1475 bdf4800-bdf4809 1465->1475 1466->1456 1466->1460 1469->1428 1472 bdf46ee-bdf46f9 1469->1472 1476 bdf46fb-bdf4705 1472->1476 1477 bdf474a-bdf4751 1472->1477 1481 bdf4829-bdf482c 1474->1481 1482 bdf4843-bdf484f 1474->1482 1475->1474 1476->1477 1480 bdf4707-bdf471d 1476->1480 1487 bdf471f 1480->1487 1488 bdf4729-bdf4742 1480->1488 1483 bdf482f-bdf4841 1481->1483 1484 bdf485b-bdf4880 1482->1484 1485 bdf4851 1482->1485 1483->1482 1483->1483 1492 bdf48f4-bdf48fa 1484->1492 1493 bdf4882-bdf4888 1484->1493 1485->1484 1487->1488 1488->1477 1496 bdf48fc-bdf48ff 1492->1496 1497 bdf4947-bdf4961 1492->1497 1493->1492 1494 bdf488a-bdf488d 1493->1494 1498 bdf4964-bdf49c9 1494->1498 1499 bdf4893-bdf48a0 1494->1499 1496->1498 1500 bdf4901-bdf490e 1496->1500 1514 bdf49d1-bdf49d3 1498->1514 1502 bdf48ee-bdf48f2 1499->1502 1503 bdf48a2-bdf48cc 1499->1503 1504 bdf4941-bdf4945 1500->1504 1505 bdf4910-bdf4928 1500->1505 1502->1492 1502->1494 1507 bdf48ce 1503->1507 1508 bdf48d8-bdf48eb 1503->1508 1504->1496 1504->1497 1505->1498 1506 bdf492a-bdf493d 1505->1506 1506->1504 1507->1508 1508->1502 1515 bdf49db-bdf49e1 1514->1515 1516 bdf49d5-bdf49d8 1514->1516 1516->1515
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq$d
                                                                                                                                                                                                                              • API String ID: 0-3557608343
                                                                                                                                                                                                                              • Opcode ID: f18a04a0263d51dcfee2ddf45d03000066a779c2a03848d8348bd4cf1994eff6
                                                                                                                                                                                                                              • Instruction ID: 10f345ec2dc8d1177223797ad5421f5932b4d58a79b5eefc667f6766318086f5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f18a04a0263d51dcfee2ddf45d03000066a779c2a03848d8348bd4cf1994eff6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EE029B34A046068FCB14CF59C48096AFBF2FF89324B16C669D56A9B765DB30F846CF90

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 1517 bdfb7d4-bdfb7f2 1519 bdfb7ff-bdfb806 1517->1519 1520 bdfb7f4-bdfb7fa 1517->1520 1522 bdfb807-bdfb813 1519->1522 1521 bdfb7fc 1520->1521 1520->1522 1521->1519 1523 bdfbb0e-bdfbb33 1522->1523 1524 bdfb819-bdfb828 1522->1524 1535 bdfbb3a-bdfbb7b 1523->1535 1527 bdfb82b-bdfb839 1524->1527 1531 bdfb83b-bdfb842 1527->1531 1532 bdfb851-bdfb85e 1527->1532 1531->1532 1533 bdfb844-bdfb847 1531->1533 1532->1535 1538 bdfb864 1532->1538 1536 bdfb84e 1533->1536 1537 bdfb849 1533->1537 1590 bdfbb7d-bdfbba2 1535->1590 1591 bdfbba9-bdfbbfe 1535->1591 1536->1532 1539 bdfbb04-bdfbb0b 1537->1539 1538->1535 1540 bdfb8bd-bdfb8c0 1538->1540 1541 bdfb93c-bdfb93f 1538->1541 1542 bdfb999-bdfb99c 1538->1542 1543 bdfbad4-bdfbadc call bdfbc58 1538->1543 1544 bdfbaf2-bdfbaf6 1538->1544 1545 bdfb8cf-bdfb937 call bdfa150 1538->1545 1546 bdfb94e-bdfb994 call bdfa150 1538->1546 1547 bdfba6e-bdfba9f call bdfa150 1538->1547 1548 bdfb86b-bdfb8b8 call bdfa150 1538->1548 1549 bdfb9ab-bdfba01 call bdfa150 1538->1549 1550 bdfba06-bdfba08 1538->1550 1551 bdfbaa1-bdfbad2 call bdfa150 1538->1551 1556 bdfb8c7-bdfb8ca 1540->1556 1557 bdfb8c2 1540->1557 1553 bdfb946-bdfb949 1541->1553 1554 bdfb941 1541->1554 1558 bdfb99e 1542->1558 1559 bdfb9a3-bdfb9a6 1542->1559 1560 bdfbae2-bdfbae4 1543->1560 1625 bdfbaf9 call bdf93d9 1544->1625 1626 bdfbaf9 call bdf93e8 1544->1626 1627 bdfbaf9 call bdf9570 1544->1627 1545->1544 1546->1544 1547->1544 1548->1544 1549->1544 1550->1544 1555 bdfba0e-bdfba12 1550->1555 1551->1544 1553->1544 1554->1539 1555->1544 1562 bdfba18-bdfba69 call bdfa150 1555->1562 1556->1544 1557->1539 1558->1539 1559->1544 1570 bdfbaea 1560->1570 1571 bdfbae6-bdfbae8 1560->1571 1562->1544 1563 bdfbafc-bdfbafe 1563->1527 1563->1539 1570->1544 1571->1544 1590->1591 1625->1563 1626->1563 1627->1563
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq$(aq
                                                                                                                                                                                                                              • API String ID: 0-3916115647
                                                                                                                                                                                                                              • Opcode ID: 2b306a281ec57279a5a9d9e2ee86e0ec687e1fca1aa9738ea8b2503c6c7770e1
                                                                                                                                                                                                                              • Instruction ID: ac7f3bce44719fa7bdd20b89df4007c5f6a917a1cd2f13a9c7cb1b8d332751b6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2b306a281ec57279a5a9d9e2ee86e0ec687e1fca1aa9738ea8b2503c6c7770e1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5CD1A330B04216CFCB44EF69D4909AEBBF6FF89210B128599D506EB365DB70ED05CB91

                                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                                              control_flow_graph 1628 bd68610-bd68622 1629 bd68624-bd68645 1628->1629 1630 bd6864c-bd68650 1628->1630 1629->1630 1631 bd68652-bd68654 1630->1631 1632 bd6865c-bd6866b 1630->1632 1631->1632 1634 bd68677-bd686a3 1632->1634 1635 bd6866d 1632->1635 1638 bd688c4-bd6890f 1634->1638 1639 bd686a9-bd686af 1634->1639 1635->1634 1670 bd68925-bd68931 1638->1670 1671 bd68911 1638->1671 1640 bd686b5-bd686bb 1639->1640 1641 bd68778-bd6877c 1639->1641 1640->1638 1643 bd686c1-bd686d0 1640->1643 1644 bd687a1-bd687aa 1641->1644 1645 bd6877e-bd68787 1641->1645 1647 bd686d6-bd686e2 1643->1647 1648 bd68757-bd68760 1643->1648 1650 bd687cf-bd687d2 1644->1650 1651 bd687ac-bd687cc 1644->1651 1645->1638 1649 bd6878d-bd6879f 1645->1649 1647->1638 1653 bd686e8-bd686ff 1647->1653 1648->1638 1652 bd68766-bd68772 1648->1652 1654 bd687d5-bd687db 1649->1654 1650->1654 1651->1650 1652->1640 1652->1641 1656 bd68701 1653->1656 1657 bd6870b-bd6871d 1653->1657 1654->1638 1659 bd687e1-bd687f6 1654->1659 1656->1657 1657->1648 1666 bd6871f-bd68725 1657->1666 1659->1638 1661 bd687fc-bd6880e 1659->1661 1661->1638 1662 bd68814-bd68821 1661->1662 1662->1638 1665 bd68827-bd6883e 1662->1665 1665->1638 1679 bd68844-bd6885c 1665->1679 1668 bd68727 1666->1668 1669 bd68731-bd68737 1666->1669 1668->1669 1669->1638 1672 bd6873d-bd68754 1669->1672 1673 bd68933 1670->1673 1674 bd6893d-bd68959 1670->1674 1676 bd68914-bd68916 1671->1676 1673->1674 1677 bd6895a-bd6896d 1676->1677 1678 bd68918-bd68923 1676->1678 1678->1670 1678->1676 1679->1638 1680 bd6885e-bd68869 1679->1680 1682 bd688ba-bd688c1 1680->1682 1683 bd6886b-bd68875 1680->1683 1683->1682 1687 bd68877-bd6888d 1683->1687 1689 bd6888f 1687->1689 1690 bd68899-bd688b2 1687->1690 1689->1690 1690->1682
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq$d
                                                                                                                                                                                                                              • API String ID: 0-3557608343
                                                                                                                                                                                                                              • Opcode ID: 552c69039c79b37d80fc411cd49d797a3c7ab32bd37edc9322a1569e2506a0b4
                                                                                                                                                                                                                              • Instruction ID: 1634c367a873b36a1ccee5eff3e4baf87b8cdd5b623754442689772270374633
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 552c69039c79b37d80fc411cd49d797a3c7ab32bd37edc9322a1569e2506a0b4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BAB14934A006018FD728CF19C58096AFBF2FF88364725CA6AD45A9B765DB31FC46DB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: ,aq$4']q
                                                                                                                                                                                                                              • API String ID: 0-1214544875
                                                                                                                                                                                                                              • Opcode ID: 24999a6850cad52b03cfd27de9f82c5c3cda4ea67b1c17007c7c0249d9a698dd
                                                                                                                                                                                                                              • Instruction ID: 65d8ceaa43957448e65dc68a3cd8d0ee053a7a9c46db049b96de2e713fd4865a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 24999a6850cad52b03cfd27de9f82c5c3cda4ea67b1c17007c7c0249d9a698dd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C061D135B041159FCB18EF6DD89496EBBE6EFD83607118069E90ACB365DE30DD02C790
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq$4']q
                                                                                                                                                                                                                              • API String ID: 0-4173138025
                                                                                                                                                                                                                              • Opcode ID: 5833cf0b13c79de5c9cbcfcb39ca08c787a535d9954913ae7ad1151c6ba45fe8
                                                                                                                                                                                                                              • Instruction ID: 57603e91195e9968d7730196ef5d126d0ef14b39e5a549b6605880f79152ff15
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5833cf0b13c79de5c9cbcfcb39ca08c787a535d9954913ae7ad1151c6ba45fe8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6D5105307042958FCB09DF6C98A06AF7FA6FF966507118999C405CF396DE34CD06C7A2
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: $]q$$]q
                                                                                                                                                                                                                              • API String ID: 0-127220927
                                                                                                                                                                                                                              • Opcode ID: d209725c8ff60a3fc2d0ee47d7d134e8adce7cc07948e663fc41aa9431aeb2f5
                                                                                                                                                                                                                              • Instruction ID: fe619673ee7357c8f656c8b5aae2b40dfc81c819965e2faeb47446798742b2d8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d209725c8ff60a3fc2d0ee47d7d134e8adce7cc07948e663fc41aa9431aeb2f5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C611A230A0E1119BD7185F95D02436AF6FAEF84B11F25892BE4838B665CBF9CA048BC5
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 4c]q$4c]q
                                                                                                                                                                                                                              • API String ID: 0-1614972355
                                                                                                                                                                                                                              • Opcode ID: e18b35b2f169561defb4d8b2677ca9950a65a315797bace6dd2768fa3883320e
                                                                                                                                                                                                                              • Instruction ID: ba528d4c28ae61bb4a6c4dbbdae29863a40de7e1ce7bd5a7c2cf7d7de9a7fefc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e18b35b2f169561defb4d8b2677ca9950a65a315797bace6dd2768fa3883320e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 68213A32D14A0ACBCB11DF68CC401D8F772FF99301F668695E6487B121EB30AA95CB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: $]q$$]q
                                                                                                                                                                                                                              • API String ID: 0-127220927
                                                                                                                                                                                                                              • Opcode ID: d0c0feec18eb597ba8e269efc97d48c9014345dc85e7c0852e7d264083f6ee4b
                                                                                                                                                                                                                              • Instruction ID: a5d17c9589a0b54114ac10aed89bdc151ac4e9ed8c86893a76f2e29dafd48cc2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d0c0feec18eb597ba8e269efc97d48c9014345dc85e7c0852e7d264083f6ee4b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 35F06D38708049DFCB18CF18D588C9AB7B1FB847A0F6280A5EA564FA19C330DD45DBD0
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 9f8dcc55332fc1e5ec5969ee3e4b14622afe6c1b842dd2d0d75d6d1e8f8ca4c6
                                                                                                                                                                                                                              • Instruction ID: bdb825787089213c63d002c2740ab6a195490359c480bb8675b2370832d482c5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9f8dcc55332fc1e5ec5969ee3e4b14622afe6c1b842dd2d0d75d6d1e8f8ca4c6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A5D18030B002558FCB14DF7DC490AAABBF6FF89750B258969D8569B365DE30EC02CB91
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 56752c1ff75e08e2cc7585a2e022a78cad53948e8050d58d12e290fa6f370906
                                                                                                                                                                                                                              • Instruction ID: 9fa27fb28e8f01f1b0d94e87476c1fc38fe0585db5936eeafa672e299a467b94
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 56752c1ff75e08e2cc7585a2e022a78cad53948e8050d58d12e290fa6f370906
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 40F12634A003598FCB15CFA8C898A9DFBF2BF89310F1581A5D845AB365DB74ED46CB50
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: Xaq
                                                                                                                                                                                                                              • API String ID: 0-686314484
                                                                                                                                                                                                                              • Opcode ID: 410277b96a108d759dd4e819b93f093ad40bd0fca6107c39fe7db9ef5a2a47ef
                                                                                                                                                                                                                              • Instruction ID: 0bdfae0bf6189fc4bd17c616b10741716861e0a3b82f3de55216bfbe7bf94047
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 410277b96a108d759dd4e819b93f093ad40bd0fca6107c39fe7db9ef5a2a47ef
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BDE1153460461ADFCB18CF69C4C89A8BBF1FF49754F5684A5E9499B260DB30EE84CF90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (Abq
                                                                                                                                                                                                                              • API String ID: 0-1163130805
                                                                                                                                                                                                                              • Opcode ID: 71ea8846601e98356c12e7ef10b3dbfd4063490dc6404e916a10574d12c732c8
                                                                                                                                                                                                                              • Instruction ID: 1284fc5d20266f5ce791440f5c9050ec0b2f81ebdb5442018c55837cc89f0f3a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 71ea8846601e98356c12e7ef10b3dbfd4063490dc6404e916a10574d12c732c8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DFC16C34B002198FDB14DFA9D894AAEBBB2BF88650F148429D406EB394DF749D06CB91
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • false,"dns":"us-ash-stream.jumptoserver.com","iso":"US","country_sort":1000,"lt":null,"lg":null,"ip":"108.181.56.100","address":null,"port":4443,"protocol":"IKEV2","ipsec":"psk123","remote_id":"jumptoserver.com","is_trial":false,"active":true,"flag":"https:\/\, xrefs: 0BD6D978, 0BD6D98D
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: false,"dns":"us-ash-stream.jumptoserver.com","iso":"US","country_sort":1000,"lt":null,"lg":null,"ip":"108.181.56.100","address":null,"port":4443,"protocol":"IKEV2","ipsec":"psk123","remote_id":"jumptoserver.com","is_trial":false,"active":true,"flag":"https:\/\
                                                                                                                                                                                                                              • API String ID: 0-1507960788
                                                                                                                                                                                                                              • Opcode ID: ded776ec01ab1d7c08b627ed9af7dcc3615265a50327d1b96b384ee8ae589778
                                                                                                                                                                                                                              • Instruction ID: 61b1783cc338b9dc71ef19889e2b2f8fe6ed13f17b0b07babb24b35d29a91e33
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ded776ec01ab1d7c08b627ed9af7dcc3615265a50327d1b96b384ee8ae589778
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1DB10874B0061ACFCB04DFA9D59499EBBF6BF89350B108469E806EB364EB70DD42CB51
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              • false,"dns":"us-ash-stream.jumptoserver.com","iso":"US","country_sort":1000,"lt":null,"lg":null,"ip":"108.181.56.100","address":null,"port":4443,"protocol":"IKEV2","ipsec":"psk123","remote_id":"jumptoserver.com","is_trial":false,"active":true,"flag":"https:\/\, xrefs: 0BD6D98D
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: false,"dns":"us-ash-stream.jumptoserver.com","iso":"US","country_sort":1000,"lt":null,"lg":null,"ip":"108.181.56.100","address":null,"port":4443,"protocol":"IKEV2","ipsec":"psk123","remote_id":"jumptoserver.com","is_trial":false,"active":true,"flag":"https:\/\
                                                                                                                                                                                                                              • API String ID: 0-1507960788
                                                                                                                                                                                                                              • Opcode ID: 6613196993d0ea63aed9ce1064ce303f01d41939b02f4f7782f7b8ad92c26675
                                                                                                                                                                                                                              • Instruction ID: 1ac30f3ad7d4a711cfd9a7d7edee79037ee911c06364fe7bfe2a625486adb4b3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6613196993d0ea63aed9ce1064ce303f01d41939b02f4f7782f7b8ad92c26675
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B0B11974B0060ACFCB04DFA9D59499EBBF6BF89340B108469E806EB364EB70DD41CB51
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 132f6dc429083e6c55b39fe90850e9e8b8cbb2d0521da381151dfe14354784bf
                                                                                                                                                                                                                              • Instruction ID: 26528f129cc9eedbe5c9e7ae4e1feaf4d810b5992328fd06e5ed2129edc86deb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 132f6dc429083e6c55b39fe90850e9e8b8cbb2d0521da381151dfe14354784bf
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 87A18E34B082068FCB149F79D468B7EBBF2EF85710F668869D502CB391DA38DD458B91
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 8c646a3bfb095fa826f8108a7ec4a9e3369ae1d87bc89b55cd5c813f098ae642
                                                                                                                                                                                                                              • Instruction ID: 6ec195ce3d1bcf99e8fe05e746035e10aef6b1bf126fd869e4cc54258aa10fb7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8c646a3bfb095fa826f8108a7ec4a9e3369ae1d87bc89b55cd5c813f098ae642
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0E719F31B042168FCB05DFADD894A6EBBF6FFC4720B15856AE619CB3A5DA70DC018790
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 4c]q
                                                                                                                                                                                                                              • API String ID: 0-1015785248
                                                                                                                                                                                                                              • Opcode ID: 152131e78a72779f0dde2cdb5f1afdd3e95b78b35598598da0bd17f751d06a89
                                                                                                                                                                                                                              • Instruction ID: efb5c47c07475e136830b4ed2dc1b633ac5f0944b3445c7bb888b55563a6399f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 152131e78a72779f0dde2cdb5f1afdd3e95b78b35598598da0bd17f751d06a89
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3081E431A1410ADFCF14DF64D480B99FBB6FF88320F1A8669EA059B256D730DD55CB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: c6f9d846d55ac4212b2341be32520c6482b21ed1b4c15b609a2f2a64774cc6a8
                                                                                                                                                                                                                              • Instruction ID: a8c194cbdd72c14b5ee8c67e18adabf330e8fa7005e13a26c5fbb7b1dac57d7f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c6f9d846d55ac4212b2341be32520c6482b21ed1b4c15b609a2f2a64774cc6a8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8F613B3AB002159FCB01CF69D88099ABBF6FF8D350B1581A9E509DB325DB31ED15DB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: e0aac7c52a0955b0b8b340c1c7eea84b59685cdc9fe56c9e064458492951eb83
                                                                                                                                                                                                                              • Instruction ID: d616ede2881dab0fb37df259747cdddce0b7103d2e44f2fbf173977594eec1ab
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e0aac7c52a0955b0b8b340c1c7eea84b59685cdc9fe56c9e064458492951eb83
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7051B2313046418FC725DF38D454A56FFF6EF99350708C6A9D48A8B766DA30E806CB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 49872dc06cc1e39519298796708af322f9a90133fe5296f144b1f8756b14c458
                                                                                                                                                                                                                              • Instruction ID: 2d4eb1e0291b5815db70cc52af1b7f360e92ddff425152debe0f518d0b26dac7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 49872dc06cc1e39519298796708af322f9a90133fe5296f144b1f8756b14c458
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D541C234B00215DFDB18CF68C894B9ABBF5EF89760F258099E445BB355CA31DD06CBA0
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 664287ff5717c6a1460264802914b5a90dba728c1b7662600f2570e673e8bce1
                                                                                                                                                                                                                              • Instruction ID: e795cfc6fb4db9b14cde5aea0f55b0f6aa55577692e1816423097c9e6b6540aa
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 664287ff5717c6a1460264802914b5a90dba728c1b7662600f2570e673e8bce1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 93417D34B00605CFCB14CF59C484A6AF7F2FF89360B25C95AD41AAB365DB31E845DB94
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 21aa95f55779bed08a23366288680aadf4f04370f9f7db38b7922ac5c3c4846c
                                                                                                                                                                                                                              • Instruction ID: ef57c1084511e06110e4efd9f2d04436ef3cc4f30db141a22c5f37ca8dd43648
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 21aa95f55779bed08a23366288680aadf4f04370f9f7db38b7922ac5c3c4846c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F7417935B006458FCB14CF58C480A6AFBF2FF89360B25C99AD45AEB365DB31E845DB50
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 6b2e479fd6acacd82882c7d37e7ad02d336f910a6a545fdf2733bb589581f7ff
                                                                                                                                                                                                                              • Instruction ID: fb5ecf7a9a1571e599b568037ae4f540c7e30f484886e737afc68c0cac4f546d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6b2e479fd6acacd82882c7d37e7ad02d336f910a6a545fdf2733bb589581f7ff
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 27418B35B006058FCB14CF58C080A6AF7F2FF88360B25C95AD45A9B355DB31E842DB50
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: ,aq
                                                                                                                                                                                                                              • API String ID: 0-3092978723
                                                                                                                                                                                                                              • Opcode ID: 62c90dd37b33fde77f3729b6cbef08f73866b5095516df9360de24c88cf33eb9
                                                                                                                                                                                                                              • Instruction ID: e570e3a34442e18cd1d3b40a5856f6cf97762cff63ac75dc0cf2aa060af2487c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 62c90dd37b33fde77f3729b6cbef08f73866b5095516df9360de24c88cf33eb9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 19318B35B0020ACFDB04DF78E8407AEBBF5FB88764F1444AAD109D7291EB759905CB91
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 4c]q
                                                                                                                                                                                                                              • API String ID: 0-1015785248
                                                                                                                                                                                                                              • Opcode ID: e548b896724064a56f24bfb8f5b3afb42ad3c47be34f1667e10186b30e459a18
                                                                                                                                                                                                                              • Instruction ID: 8f331a9a08b9f841a02e0e3fbff6d84eb16d67d5503dc1d91107ca286a140755
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e548b896724064a56f24bfb8f5b3afb42ad3c47be34f1667e10186b30e459a18
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D031C331A1810ADFDF14DF55D490BA9FBB2FF48320F198269EA44AB242D770DD55CB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3348680506.000000000BC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BC00000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bc00000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: `]bq
                                                                                                                                                                                                                              • API String ID: 0-248503667
                                                                                                                                                                                                                              • Opcode ID: 5f7b36cd9b75330146c9f0c22fe3f72bd76e36e82a95f8c1fc3c4b064aabfae6
                                                                                                                                                                                                                              • Instruction ID: 27ba6e4972e6549dd9d250953b049e2d02ffc204bfefca039c3003c3c240cbfc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5f7b36cd9b75330146c9f0c22fe3f72bd76e36e82a95f8c1fc3c4b064aabfae6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8A318D3163A30CDFDF258E49C444BB937B5AF81665F1B8066E8198B2D1CB34DA81CF69
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 4']q
                                                                                                                                                                                                                              • API String ID: 0-1259897404
                                                                                                                                                                                                                              • Opcode ID: fb024a9033c60a3e930f0a5c88ace85657efdca202de01ec87346c8f0c880457
                                                                                                                                                                                                                              • Instruction ID: 605b2e08d1521611c175a52faaeb3ecb86b891b720036e843968852885ba6324
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fb024a9033c60a3e930f0a5c88ace85657efdca202de01ec87346c8f0c880457
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 02318E34B402159FC708DF6CD494AAEBBE6AFCC760B158169E90ADB364DA30ED01CB90
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: PH]q
                                                                                                                                                                                                                              • API String ID: 0-3168235125
                                                                                                                                                                                                                              • Opcode ID: e84dd497332d0e46a2b1a1527c1416bbe17562f603007b781033ca7e32b49b17
                                                                                                                                                                                                                              • Instruction ID: 47b12008093901944403a98bc670126047157fe48c4cbe6d96654028b018a400
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e84dd497332d0e46a2b1a1527c1416bbe17562f603007b781033ca7e32b49b17
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B721B131B0400A8FCB14DEA5D858AAEFBE9FF88311F14406AF916D7294DA758D02DBA0
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 7c61dae2924a0a19691d4f2f5e9a6096a8c547f498143c261bf8fcb25925d5d0
                                                                                                                                                                                                                              • Instruction ID: 1690062aae62a76e8ab6d2c9beee395b651dda567f80302f30a6f44ecb246cff
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7c61dae2924a0a19691d4f2f5e9a6096a8c547f498143c261bf8fcb25925d5d0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E621F2317002059FD704DB6DE4A4D6ABBEAEFC922071484A9E14ACB366DE70EC06DB51
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: LR]q
                                                                                                                                                                                                                              • API String ID: 0-3081347316
                                                                                                                                                                                                                              • Opcode ID: 5cbc658d2a721237de747dbe487e71901ad30788b4dfef1fe7ced98dbc8ded48
                                                                                                                                                                                                                              • Instruction ID: 62386f13f1f5be3dcb9f4fc997528fa29bfd5293b979a073962f78936c4f177b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5cbc658d2a721237de747dbe487e71901ad30788b4dfef1fe7ced98dbc8ded48
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F5219234F00109DFDB08DF69D458AAEBBF6EF88750F108159E506A7364DEB09C05CBA5
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: \;]q
                                                                                                                                                                                                                              • API String ID: 0-2696284100
                                                                                                                                                                                                                              • Opcode ID: d8b0f92d3431d5891abe1ebda9d2068139b520c5d0ba8cb8aa7bcc8fd6e060fc
                                                                                                                                                                                                                              • Instruction ID: b7452d79d0ea727a1139c39a14cf2b496f3c896cacf29b5e485b6e142a085ea8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d8b0f92d3431d5891abe1ebda9d2068139b520c5d0ba8cb8aa7bcc8fd6e060fc
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD1173327542024F97149AAEA48596BF7DEEFC42B8314803FE50EC7759EE71EC019350
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: f66ce1108e22ebcef03a6b2fb770e9bba0072f001d12c0adabc95df1fa29a01d
                                                                                                                                                                                                                              • Instruction ID: 96decac5d58d4890792fc8be21098029ca29f1ebf675560a263ecd66d6e8d6a7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f66ce1108e22ebcef03a6b2fb770e9bba0072f001d12c0adabc95df1fa29a01d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FB115731B082404FC315AB78A44499DBFB2EFC6710B0546ABD509CB2A6EE708C0A83A1
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: 8aq
                                                                                                                                                                                                                              • API String ID: 0-538729646
                                                                                                                                                                                                                              • Opcode ID: de657f4aba878aec4afd188e924ed24a64268f1a8018a4f8ab6d654b4219cc91
                                                                                                                                                                                                                              • Instruction ID: d4f22fe53d5678a63eb4ebf6d95b478a1e39b6df5058215479dc01db251881be
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: de657f4aba878aec4afd188e924ed24a64268f1a8018a4f8ab6d654b4219cc91
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FA21C635A04129CFDB14EF66E450AEEFBB2FF89760F004229D801B7384DB74A905DBA1
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: $]q
                                                                                                                                                                                                                              • API String ID: 0-1007455737
                                                                                                                                                                                                                              • Opcode ID: 4f7e017f9c579511c7b82cebe5ee3337c48424804d9fbcef17c978702907d1b0
                                                                                                                                                                                                                              • Instruction ID: fd377a32515602b56e3faf8856060c3579edf84a08e17d4f6a4c3d18806c5050
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4f7e017f9c579511c7b82cebe5ee3337c48424804d9fbcef17c978702907d1b0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1C11C430A1E211DBD7185F55D02836AF7FAEF44B11F25882BE18387A55CBF9CA048BC1
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 23a4c5cc77af38875175839f06bf4982ef29afd816a618efcff1958e2cd87fe6
                                                                                                                                                                                                                              • Instruction ID: 533595f90ced33ed1429b280a0f180f028546059eb81918521a2017c49911445
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 23a4c5cc77af38875175839f06bf4982ef29afd816a618efcff1958e2cd87fe6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 911125322187908FC3268B68A41459ABFE2EF8235470548ADC08287796DFE8A90AC352
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: (aq
                                                                                                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                                                                                                              • Opcode ID: 8b2fdc301ccb13cd51816c8b84eb21babfe336079ac8862181b90a3502130d09
                                                                                                                                                                                                                              • Instruction ID: b9686aca4456c86e407bc07865451145122740795788cf9730a599923e0f6314
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8b2fdc301ccb13cd51816c8b84eb21babfe336079ac8862181b90a3502130d09
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5B014931B092918FD70A46788450029BF62EB9259035C80DDC5899F293CE1ADD03C392
                                                                                                                                                                                                                              Strings
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID: ,aq
                                                                                                                                                                                                                              • API String ID: 0-3092978723
                                                                                                                                                                                                                              • Opcode ID: aec43dde05700947c3cfcd1f3d52c1f370dd5253ad2b92fa496a3c5681cb83ee
                                                                                                                                                                                                                              • Instruction ID: 033baec87ba5919bbd412c561244ae1ce134b539e05d7c2f727b4dfc3ea0341d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aec43dde05700947c3cfcd1f3d52c1f370dd5253ad2b92fa496a3c5681cb83ee
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9CF0B4313045218FCB049F79C8456AABBE8FF456A1F1604DBE085CB1A1DF34C840E722
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: b534ba49d59b596fa22cbeb40ea9babb6615b0326c4da4065ebec6df56089e79
                                                                                                                                                                                                                              • Instruction ID: 0a783424350a862b490a2bdfd00bb6732f9199e899a627a5591e8a601fc87361
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b534ba49d59b596fa22cbeb40ea9babb6615b0326c4da4065ebec6df56089e79
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6622C331E0420A9FCB15CF68C8809EEBBF6EF89314F158629E915A7394E731ED45CB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 03fa133da5b3649738abf4610faa8275ffe10418e86145d2409b16611c4f3994
                                                                                                                                                                                                                              • Instruction ID: d9a903b7937dce3a4fe1cb0ec4f221ad10528f8ae76aa47f54066a436c87beb2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 03fa133da5b3649738abf4610faa8275ffe10418e86145d2409b16611c4f3994
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1FE1D531B042148FDB64EFA9D4947AEB7F2EB85321F2284A9D507D7390DE70CE918B91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 716dce7bd9fc7e30c849c3d578ef88bffde090b836a67c99bec1f7461029b4f8
                                                                                                                                                                                                                              • Instruction ID: 25afbf8ae64f070860d60514fe98b74d01cfd8ccd692bed1ef612372c1bca99f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 716dce7bd9fc7e30c849c3d578ef88bffde090b836a67c99bec1f7461029b4f8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A7D10A35B01119DFCB15DFA4D894DADBBB2FF88720B168069E906AB360DB31ED12CB54
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 165b8aed5213561539bcb0c07c6ee0279896994f6f3c0941c4b09650639fd948
                                                                                                                                                                                                                              • Instruction ID: d9bc341d20036cca2691cb6c1d225e94f1e9e3fa026b00aca000ce5e07086a3b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 165b8aed5213561539bcb0c07c6ee0279896994f6f3c0941c4b09650639fd948
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3AC14C35A042158FDB54AF69D8587AEBBF6EB88310F2145A9D90AE7390DF308E81CF50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 78e501697ad723c9ceca6c6448d94700739e4518f877b3beb6c811df89cd6b13
                                                                                                                                                                                                                              • Instruction ID: cb455239bf4abfcc089030e3a4f9de707f1b5ed2081ba836d6a89ba725c8e81f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 78e501697ad723c9ceca6c6448d94700739e4518f877b3beb6c811df89cd6b13
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0BD12534A00359CFCB05CFA8C898A9DFBF2BF49310F1581A5E848AB269DB74ED45CB50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e063a7fa20f74eeba05772ae50ba4dcb00994be264149b5f5c012f5b21a59a5f
                                                                                                                                                                                                                              • Instruction ID: 2db6a9b171b762f2b8968f6f31d084af8213b869a2be66b4c2b4df2b170b142d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e063a7fa20f74eeba05772ae50ba4dcb00994be264149b5f5c012f5b21a59a5f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BDB15D32E1065A8FCF11CF98C8509DDFB72FF88320F298615E919BB254E771A956CB81
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ae1214acb21e4df7d5a96215688e62830ce646152506c6d1dbbf44c41f145aae
                                                                                                                                                                                                                              • Instruction ID: e9482fc40c5d3048e000eca7bc9637d7f8c8afdc4c9e8046e36edfccbe2d9c16
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ae1214acb21e4df7d5a96215688e62830ce646152506c6d1dbbf44c41f145aae
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: FFB15A34B006018FCB15EF79D59496EFBF2FF88210B048669D95A8B365EB34ED06CB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 43dee8cb23408848522b9990bc50449ca6bc58cb3ee38c33d87a4467002a7fca
                                                                                                                                                                                                                              • Instruction ID: 8ef88b5f72e1e45d5368fa0043e3a6c3ff471907ec6eb733744f14fadb04d787
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 43dee8cb23408848522b9990bc50449ca6bc58cb3ee38c33d87a4467002a7fca
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD917F74A0821ADFCB149F55C8549AEFBFAFF88770B114429FA569B324DA30DD40DBA0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: d2ea1a21466f6d598e551d68c00ef7d4e2a8490c43ebbfbb4f52c838943db563
                                                                                                                                                                                                                              • Instruction ID: 44e31ca58c208e41f1c2c3f3a340d61fc8964d1b4435cecd0e14e4ba50123e0e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d2ea1a21466f6d598e551d68c00ef7d4e2a8490c43ebbfbb4f52c838943db563
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7C81AF35704206DFCB14DF68D894AAAFBB6EF89320B118569EA06CB360DB31DD15DB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: d18fadcdba4f97333a80e7712679a4125cace46e88649d5eb2eab68df13e6b6e
                                                                                                                                                                                                                              • Instruction ID: ca49de46a5bd5f4b3b0a761c874523a71a0130ba97158079104d3fd4623af160
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d18fadcdba4f97333a80e7712679a4125cace46e88649d5eb2eab68df13e6b6e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A271B335B0820ACFCB10DFA9D8549AEFBB6FF84220B15856BD616DB351DB30D905CB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: a49a6a9065c10e51ed1a818cc9d8e188f0b7c961118a7705a803a4697f7fd487
                                                                                                                                                                                                                              • Instruction ID: 322363f7135dfbea80bf408508d4f1fcf378b415375befb7680a422ecf78b0a7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a49a6a9065c10e51ed1a818cc9d8e188f0b7c961118a7705a803a4697f7fd487
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F6818231E04209EFCB05DFA9D8909AEFBB5FF88310F11C559E959AB254E730AD41CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 7f5dda36a03a50d34b338ea6df0798a2d304668866cf1f5bd9f4e9702c2874e5
                                                                                                                                                                                                                              • Instruction ID: f8f357421d266daa91465de1ce58249832c332b86a8f39df5cfb32e6b2fca42b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7f5dda36a03a50d34b338ea6df0798a2d304668866cf1f5bd9f4e9702c2874e5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA61C130B1420A9FCB14DFA9D444AAEBBF6FF84310F158569E505DB3A5DB349E05CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 0b8358cb82581b5010cfad722a3bae94540e0a03d6460d21a4bd8182c1692020
                                                                                                                                                                                                                              • Instruction ID: 6eb1fa5f6318d0b433e4b0aaa06184cb83de74487ff05603b25913daaf8c0fc1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b8358cb82581b5010cfad722a3bae94540e0a03d6460d21a4bd8182c1692020
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 21818B34B006018FCB15DF79D59496EFBF2FF89210B048669D9568B355DB34E80ACBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ce05350d2481c5bfd6204c697255c7b27d7614e8d0990b37e6da9b54280922d0
                                                                                                                                                                                                                              • Instruction ID: 02261769c15db907f4d3b817b1d38e4fb6528cf4e4ec0364970d847e2a5bcd41
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ce05350d2481c5bfd6204c697255c7b27d7614e8d0990b37e6da9b54280922d0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2861A035B012058FDB14DF65E554A6EFBF6BF88A50B208429E406EB394EF70DC06CB92
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 65ae7b8261829beedb908383974d98d184c88ad1daa89b2fbe277db5eddeaf11
                                                                                                                                                                                                                              • Instruction ID: 538d981055ac56756d10848b1c1a5119e37ff63c5ad35d54483b2070a16580c2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65ae7b8261829beedb908383974d98d184c88ad1daa89b2fbe277db5eddeaf11
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 83519F71B047069FCB24CFAAD890A6BF7E6FF84224B24892DE646C7714D775E805CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 7956a27483f6b687a5bd2ca1ad8a85108bc85bffd205b67df44507815d9a486a
                                                                                                                                                                                                                              • Instruction ID: d1dad33898ed76102cedb90d13a1ceabf42d833c1160a6210be1e8267164e5fc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7956a27483f6b687a5bd2ca1ad8a85108bc85bffd205b67df44507815d9a486a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5B515C34B002068FCB04DF69D950AAEBBE6FF84360B15C569E4099B365EB30ED05CB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 44f963b8f793dbb37a41c95cff166df9bd4346b86e9d925d94eec5450d20402c
                                                                                                                                                                                                                              • Instruction ID: 6c68515f4c8c0ce950f92bd4838c84d2de8c9a7800e982339446672692266cc9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 44f963b8f793dbb37a41c95cff166df9bd4346b86e9d925d94eec5450d20402c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3751D630704202CFDB14DF75E984A6AFBF6EFC5210B0445AAC956DB3A5DB30D816D7A2
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 4f8522a73d3217ac0e8b19a464b4a31ddc3ab959c2bb227dbad49c4692b5ba32
                                                                                                                                                                                                                              • Instruction ID: dad9a67a928bde64df8967326e44033942a21221e6ae858c2f3b097edfc2a9d7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4f8522a73d3217ac0e8b19a464b4a31ddc3ab959c2bb227dbad49c4692b5ba32
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F851E770A00219DFDB05DBE4D550AEFFBB7EF88310F104129D6066B3A5EA395D05DB92
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 69265313d0a4928dc20224681860ab70e3dab7e5d0e5e34de275ca75fa60048c
                                                                                                                                                                                                                              • Instruction ID: e9361711015c4703f838c64c52f921a9f29dab24aaeb8220b8e85801a618a41f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 69265313d0a4928dc20224681860ab70e3dab7e5d0e5e34de275ca75fa60048c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 30516A35304206DFDB15EF64E854A6ABBB6EF88315B20452DE606C73A4CB72EC02DB61
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 85c3fcc2c700618730f5f1755fec93a612afc951954969fd49de5ff7817b2d53
                                                                                                                                                                                                                              • Instruction ID: ed5d69f01cb964d824b4b96ed987439aaa3747821cece8afac26def5ef1e2b05
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 85c3fcc2c700618730f5f1755fec93a612afc951954969fd49de5ff7817b2d53
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD51D031705212DFCF05CF68D88496ABBB6FF49724B1580AAEA05CB366D731DC41CBA0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 231bef235838c87292dc99b9290adf86e190ebe6dae3175a5c3801012aea5e17
                                                                                                                                                                                                                              • Instruction ID: 04aea6798d5e562e05e3d31ec9659e97ad388d0f30ffdf30952de4a5738711c2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 231bef235838c87292dc99b9290adf86e190ebe6dae3175a5c3801012aea5e17
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4C51D474A002099FDB05DBE4D950AEFFBB7EF88310F108129D606673A4EA395E05DB92
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: f823b95a257e32a989fa30460d6cc2b865469870d50d07413bfd5c0d16fab32a
                                                                                                                                                                                                                              • Instruction ID: 363145cad9bfdd4bbc830ef968b1d940e8a13ef625659657197678f377b89c92
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f823b95a257e32a989fa30460d6cc2b865469870d50d07413bfd5c0d16fab32a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B9514974A00209DFDB05EFA5E854AEEFBB6FF88300F10882CD916673A4DA355D04CB65
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3113766ebf1e953631132700ebf3e974507a4ddedffef7c6c7d26a933f4ff181
                                                                                                                                                                                                                              • Instruction ID: 661efe971a1121f5bb9f2766519d89dcbb1097e52f9dc9af41586f43ae70f4f9
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3113766ebf1e953631132700ebf3e974507a4ddedffef7c6c7d26a933f4ff181
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 27518E34704A129FC715DF69C49492EF7F2FF887107228959D50A8B7A1DB74ED82CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 1d42b1e2c8d3d1e3b46dad7027190c16ac455a3112e32ca3aca1381bf28411c2
                                                                                                                                                                                                                              • Instruction ID: 9a45f7eb24610ed9b0dc637a81d0d63df3e89f8230b63b4fa2f6530a40514101
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1d42b1e2c8d3d1e3b46dad7027190c16ac455a3112e32ca3aca1381bf28411c2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D4511875A00209DFDB04EFA5E954AEEFBB6FF88300F108828D916673A4DA355D05CB65
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e10cd639568a90ad02185c8bfa35fb81d6f4ffe26f68bc49a7cedd963f86f769
                                                                                                                                                                                                                              • Instruction ID: 0dbd6864786d04c9a708e240f4e263aa62985f684fe28eace1d0effd6267f144
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e10cd639568a90ad02185c8bfa35fb81d6f4ffe26f68bc49a7cedd963f86f769
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3741A179B001068FCB14DF68C9819AEF7F6EF88260B118175DA09D7356EB31EC42CBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 1653ecab0dafddaf5539e3c48ae355d0f80a6cfc796dddc03b51cc693f6b8bb3
                                                                                                                                                                                                                              • Instruction ID: 78375328f019f1110c27d2756f6e7bb9e5bf7420243592274f3337f60a3f52b5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1653ecab0dafddaf5539e3c48ae355d0f80a6cfc796dddc03b51cc693f6b8bb3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD518034A01225DFCB04EF66E454BAEBBF6EB88350F148229D805A7359DB34DC46CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 31952c911186c3cb51614e6727c7a9377c1780d34c1a06fa2f0596218447331e
                                                                                                                                                                                                                              • Instruction ID: a3242cad3a13208fc377499fd9ab4c46ba113bac11788d0ba15e306172d49b83
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 31952c911186c3cb51614e6727c7a9377c1780d34c1a06fa2f0596218447331e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F931902260E3E05FDB039B7CACA45957FB5DF83264B0E00E7C084DF1A7D659984AC3A6
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 472f14b8c547767ed64bf10f2cbb7b357d835c7438da4361a25aceae336e1eac
                                                                                                                                                                                                                              • Instruction ID: 6aa44ac31c512a1745f1664e4b8905307ab9a944c63b671094984176242dd000
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 472f14b8c547767ed64bf10f2cbb7b357d835c7438da4361a25aceae336e1eac
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BD416B35E002598FCB05DFA9D59099EFBB2FF89350F15816AE801AB365DB30ED46CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 055817a6c82b66b881ec94f4d17e49e8248e5b75fc4bb7f86222ebca82ed3762
                                                                                                                                                                                                                              • Instruction ID: 15d7704c33ab720a604bc955d15d6d7f010d301cb927c7416ac3f253571ab7b7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 055817a6c82b66b881ec94f4d17e49e8248e5b75fc4bb7f86222ebca82ed3762
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: DE416D30A1020A8FCB14DFA8D888AAEBBF6FF84310F158569E515DB3A5DB74DD45CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: aac0a4e246c86dc4f86ba299f08b5379c7f4b00b56353b194a94f659b01d409f
                                                                                                                                                                                                                              • Instruction ID: c07b7f455900275ed7fb01b72d0d24a93b878e6e4d32b4c7bbc39dd3d3d453bf
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aac0a4e246c86dc4f86ba299f08b5379c7f4b00b56353b194a94f659b01d409f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 50418E30A01209DFCB05DFA8E590AAEFBF6FF89354F50866AD0059B345EB30E945CB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 0242f0e2b5502fe9a2a0c06da9c1b660619939b305d6cd5057f4647d9bee788e
                                                                                                                                                                                                                              • Instruction ID: cdad699ee1344d5581a0eaf29717d52253afdfc7d71d65585c26c8f29692b37a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0242f0e2b5502fe9a2a0c06da9c1b660619939b305d6cd5057f4647d9bee788e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F141AE307042558FCB15DF69D888A6EFBFAAF89210B044869E146CB366DB34E909CB61
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: b335c1473c1047a813f6dfd509cd3d563a28cca87c80476d3215bc57af14a1d3
                                                                                                                                                                                                                              • Instruction ID: de7d5d925a73f07f82da4afc6f9bd20ac80a2c99fe62c44959645fa38b6f4769
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b335c1473c1047a813f6dfd509cd3d563a28cca87c80476d3215bc57af14a1d3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 61318134618B138FD7248B58D09473AF7F1FB44725F12C81ADA8F86B81D7B8E8819A40
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ed716538b8bc32af3de0c9b4dc3e6309f3b2e36bd515acdd168b7fcd11196a95
                                                                                                                                                                                                                              • Instruction ID: fd9554bdf42481aaa762164b3d9d374deff0fd65c360dea1acb51f0ad1d8cddc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ed716538b8bc32af3de0c9b4dc3e6309f3b2e36bd515acdd168b7fcd11196a95
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D6415331A00205CFC725EBA4F458BAEF7B7EF84354F148539C12697690DF74A949CBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 5bfa7122595574e832b552d965f46cc63b784c6d080ca26720da0c1b9605f4e7
                                                                                                                                                                                                                              • Instruction ID: 27346ebb9151144bb3fce9cad6b7b3eb458c9665b218fe3974c63a9fd7524bcc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5bfa7122595574e832b552d965f46cc63b784c6d080ca26720da0c1b9605f4e7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CF41BF30704255CFCB15DF68D888A6EFBFAAF89310B044969E146C7366DB34ED09CB60
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: b62ef82fab3433dbeaaf6a039789f6ea0f5239a226935f7036a01366d45707f2
                                                                                                                                                                                                                              • Instruction ID: fe023eeb53a8eed874a986ab1db52ec38ad8e94a43612e1020672c6f4b213eda
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b62ef82fab3433dbeaaf6a039789f6ea0f5239a226935f7036a01366d45707f2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7841E3B1D01209DBDB20DFA9C584ADDFFB5BF49714F24802AE408BB251D775AA4ACF90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 0708b085dceb4413c2a98b9420ef1d2975a86daa402910d26a188362df75a168
                                                                                                                                                                                                                              • Instruction ID: 79d1a30a91c442a375e406501570ddfe8ee0979c983cfe25142ed921081bb3c6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0708b085dceb4413c2a98b9420ef1d2975a86daa402910d26a188362df75a168
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5F31B430F082069FDB249F65D47876ABBF2AB80711F628868D642CB781DB38D945CB41
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c0398613838461f0d2cf83baa88aea78f68d4f12eb390a1e6b517b424af11302
                                                                                                                                                                                                                              • Instruction ID: a1bf847a2d022d2fe7bf2afcede107d462beb6ed432c810ad423382df7b66f65
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0398613838461f0d2cf83baa88aea78f68d4f12eb390a1e6b517b424af11302
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9731C131B05219CBDB15EB7AD0146EEFBB2EFC8364F10882DC416A7384EF3589469B51
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6b6c829446e16f9549334352fcbc55fcea618b68b101811462ac666aad403625
                                                                                                                                                                                                                              • Instruction ID: 176629530a58254670f5580369caa993a5a5ca7156c0d07296df4f104402bcf3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6b6c829446e16f9549334352fcbc55fcea618b68b101811462ac666aad403625
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C341D2B1D01309DBDB20DFA9C584ADDFBB5BF48354F24812AE408BB254D775AA4ACF90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 01c082d1b99220c8a28b17bfbd4463dcb4b58e513f663767a16f5c40396bf2cd
                                                                                                                                                                                                                              • Instruction ID: fbdd9698484137376b9dcba7eb1d16b47363acad38dca580756ea621c7aed1e6
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 01c082d1b99220c8a28b17bfbd4463dcb4b58e513f663767a16f5c40396bf2cd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CF31E530B012258FDB24DF6AE984B6ABBF6AF84350F049564D404FB2A6DB30DC40D7A1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 4bdb3f7bd5b22a5900869ed4ebbaa11e0abcf2efb6f4a0ad8d8268c8913c6889
                                                                                                                                                                                                                              • Instruction ID: 2bd8c2a6e0e25f4bede5990c59d219abdc8941139040c193dc6e40c892b99aad
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4bdb3f7bd5b22a5900869ed4ebbaa11e0abcf2efb6f4a0ad8d8268c8913c6889
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 913167352046059FC754DF29D884E6ABBF9FF88724B11846AE946CBB60EB70F845CB50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6983d231890f1d062cf6b68cd045c7169d9c755316a8c38df7cef82a624a66e5
                                                                                                                                                                                                                              • Instruction ID: 4c9218af785286bda99043e76a42957860e050fb39a504c572ae62e0903e6410
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6983d231890f1d062cf6b68cd045c7169d9c755316a8c38df7cef82a624a66e5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6531263160460AEFC715DB69D880D9AFBB5FF85320B118A66D52DC7611CB30F855CBE1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: eb5e9c7be3206d2a0fb943026e290abba755c95b1cfc52ae3499c074fca713a4
                                                                                                                                                                                                                              • Instruction ID: ba5e1b9bf114903ae0196739e1aa56fd4182146209bc96939d18e2252290da8f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: eb5e9c7be3206d2a0fb943026e290abba755c95b1cfc52ae3499c074fca713a4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A231C330B011258FDB24DF69E984B6ABBF6AF84364F0495A5D404FB2A6DB30DC44DBA0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 74dfd24720f8c1f0ee569e1d1a50835040e211a5ab8e3de817fa28e3fe3b7627
                                                                                                                                                                                                                              • Instruction ID: f38c91c1e412103af0c23ae834b239f5565d0acad39fef6532f0794f50b7ff22
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 74dfd24720f8c1f0ee569e1d1a50835040e211a5ab8e3de817fa28e3fe3b7627
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0D31F4326046404FCB01EB78D4945DABFF6EF86310B1589AED586CB352EB31D80ACB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 684db0d833b304f0dc1bc06d8ead6915f70f9689d9e443783de39c77d1baf2ce
                                                                                                                                                                                                                              • Instruction ID: 2f8af7005dfd778ae465af72e3b1191ed04a86622562c0060de10ede9613e898
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 684db0d833b304f0dc1bc06d8ead6915f70f9689d9e443783de39c77d1baf2ce
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 75312BB1E002489FCB14DFAAD844ADEFFF9EB49210F10846AD419E7351D774A9458BA0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ef2c3451c14e2b3a13a1c72b1e7389add78b8060784a12110d85d7b54c9d73db
                                                                                                                                                                                                                              • Instruction ID: 4ed919202bb8b41efaf56887f497a1e4f75450ac731a05ec37929bdb3302609a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ef2c3451c14e2b3a13a1c72b1e7389add78b8060784a12110d85d7b54c9d73db
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 63313A71D106198FCB15CF95D844ADDFBB2FF89310F558195E848BB214DBB0698A8F90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 71f95744be975ac10e59efd4f8b5ffca5af7884ea7d0be2e6f49e35a59a02fe4
                                                                                                                                                                                                                              • Instruction ID: 111dfd031f35faf6c20eb156710b31129ffa289eca71eed9724165c40ff25740
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 71f95744be975ac10e59efd4f8b5ffca5af7884ea7d0be2e6f49e35a59a02fe4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F031F872110200EFDF069F58D9C0F167F6AFF88310F258599EE090E25AC736D455DBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 18367f8dcb0051160e1f8785a23cea27dd7814ff025c5d03a52fe8ecf8fcbe1a
                                                                                                                                                                                                                              • Instruction ID: 773705914e089c38242ed723aa900572c8ca381b1a4c63481105120245740a3d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 18367f8dcb0051160e1f8785a23cea27dd7814ff025c5d03a52fe8ecf8fcbe1a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C210031B046108FCB09EB38D85482EB7E2EF8967031284A9D906DB365DE30DC06CB65
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 8ac0d3d878edd67943988d6ba7f18f9e9737d0813c8371fb82df78f26dd168ec
                                                                                                                                                                                                                              • Instruction ID: 444003ffa6a9d0d6da9a899947351d104f65dc77c06d46b1d86328a29ae8375f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8ac0d3d878edd67943988d6ba7f18f9e9737d0813c8371fb82df78f26dd168ec
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C821F7B2514240EFCF069F54DAC0F26BF65FB88314F25C6A9EE090E256C376D416DBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 53e42f947033f2667a8cac9980113b3a2f210aa8cea196bedf1a7b0f45af60bd
                                                                                                                                                                                                                              • Instruction ID: e443ee3da7dff18194102c585db7c864ce54bb56b864dca1abe2d042e78ff6e8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 53e42f947033f2667a8cac9980113b3a2f210aa8cea196bedf1a7b0f45af60bd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4221CF35F006068F8B04ABA9E89497EFBFBFFC5220361456AE215CB360DE31DC068B51
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3a1d2d52051cfd57f2b608a1eb271420cace00d19c645cb834d3b85aeafe85ba
                                                                                                                                                                                                                              • Instruction ID: 5fd3f594b7835bf760f666647c1446841f366f8903b2d83df90c1a3c1c4f02b4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3a1d2d52051cfd57f2b608a1eb271420cace00d19c645cb834d3b85aeafe85ba
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D1316F35A01228DFCB05EF66E4546EEBBB7EF88350F144529D805A7359DB349C46CBA0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 9e1487713fb0bb539cd835e95c2174fdcd13542340122717cc33464c66dd520b
                                                                                                                                                                                                                              • Instruction ID: 081f178df5704cb58d4a2b15b664e1cc44d810b80b33c7451f037f7e8deaa67d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9e1487713fb0bb539cd835e95c2174fdcd13542340122717cc33464c66dd520b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6F21A134B001158FCB04DF75E5546ADBBB6AF88350F144929D502EB3A4DF79DD058BA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 8296f912b2922b2ad21a72ea52991da7e27f9894a6f6bd2605a6e464d96cecea
                                                                                                                                                                                                                              • Instruction ID: df5c5f507663b31b32040e1525ef31ef6d257208b49fe9f74192d9770f1a3197
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8296f912b2922b2ad21a72ea52991da7e27f9894a6f6bd2605a6e464d96cecea
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 81216470214608DFCB45DFA8D9C0B26BF65FB84314F20C96DEA494B292C77AD446CF61
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: d556fb7c36634c8207b7d6e34912d4e4eab4fa2b420bbffd86311fc1c04f33f0
                                                                                                                                                                                                                              • Instruction ID: 6a9e1533d5c2f4b996ef846caa8e47105515a688e78513a38283c90cb7934fe0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d556fb7c36634c8207b7d6e34912d4e4eab4fa2b420bbffd86311fc1c04f33f0
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 24212271614608DFCB15DF68D980B26BF65FBC8315F20C56DD90A0B296C37AD407CAA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: f3f91730a3a06e263f351cb8960f6be3cfca85e45ccd95b73f9614b27fd33a41
                                                                                                                                                                                                                              • Instruction ID: a040b68efe0c5635e52d044935e6d7d1fccd13b3ac33f7e67235e1e88acf6877
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f3f91730a3a06e263f351cb8960f6be3cfca85e45ccd95b73f9614b27fd33a41
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ED11DF31E1820DEFCB05EFA9E9505ADBFF5EF85250B1445AAC545A7240DA309F05DB81
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 8543c14a05919135a7dd7856f2c8215ea7f1e8784e7f0fc1b673abcaea9aa0d9
                                                                                                                                                                                                                              • Instruction ID: 0d587f53ebba5e19a65f86695bb575fbe0e1078cad901c5110a90470c1aa699f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8543c14a05919135a7dd7856f2c8215ea7f1e8784e7f0fc1b673abcaea9aa0d9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0E215170E053099FCB04DFA8D5919AEBFF1FF89310F504599D486AB365D730AA41CB92
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c796608960d5ac655b93808341d643078c547307028ef8eed24f1875b0d93368
                                                                                                                                                                                                                              • Instruction ID: 702bd1fb71136ea2d85b75b8e843be44ea742656440ea6d068041b30234fe7a0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c796608960d5ac655b93808341d643078c547307028ef8eed24f1875b0d93368
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 19219334B001059FDB04DF79D4546AEBBE7AFC8710F154868D541AB3A5DE74D8058B62
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: fd3f4ac0631ff22dd56ccf4d2f47cf00efda065eea4add5a65fc2f6b0320be09
                                                                                                                                                                                                                              • Instruction ID: d0a355e0d9e6d52adb4d352c516ec6c72c39a509f32cc84f2c2c83580d9e2061
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fd3f4ac0631ff22dd56ccf4d2f47cf00efda065eea4add5a65fc2f6b0320be09
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4321AC76404240EFCF028F48D9C4B56BF72FB88320F258699EE090E26AC336D466DB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ac706478ed8e0b975fac9fbf98c0c10b3f55379ed33725949e2df8455e538a30
                                                                                                                                                                                                                              • Instruction ID: d558e7e67cb695c57b747a6b8979852bb119563324bd5a6a7c2e5bcfbcc7427e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ac706478ed8e0b975fac9fbf98c0c10b3f55379ed33725949e2df8455e538a30
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 70218BB2404240DFCF06CF54D9C4B56BF72FB88314F2586A9EE090E26AC336D426DBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 2add6d694c15ea8b31184a58c3410e914b5d01580b85b5618b07efe9f969bb86
                                                                                                                                                                                                                              • Instruction ID: eb9a9466825a24b3d540808d11f933189e651821942b36955e39a0ef68fdb0a3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2add6d694c15ea8b31184a58c3410e914b5d01580b85b5618b07efe9f969bb86
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4011C435204605DFC710CF19C884BAABBF8FF4A720F15806EE586C7A61DB30E949CB60
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 9fa774e5799602d37aa726b9e9e74e898c9338544e2bd90670080484946ae2ad
                                                                                                                                                                                                                              • Instruction ID: a435041a3b69595f97622f90364de522a3a168b4a2a452b4f7f62c7cac5ae9fc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9fa774e5799602d37aa726b9e9e74e898c9338544e2bd90670080484946ae2ad
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0521D1755083848FCB03CF24C990711BF71EB86314F28C5EAD9498B2A7C33AD40ACB62
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3dff8aa441dbdc2c5cba188b8961fa40b9e758e60bc0a9f421a63a69f43badde
                                                                                                                                                                                                                              • Instruction ID: 6c68d681ebd7fdb6dbed8f92ac9cb5bf078393e3bb91c05bc9de215236583508
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3dff8aa441dbdc2c5cba188b8961fa40b9e758e60bc0a9f421a63a69f43badde
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0B119071B001059FCB14DF6AC4A5AEEBBF2AF9C760F20445ED502EB364CA715D058BA4
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 4ee5267a5176d9a11cc91f101b3420e9c6910ef1d79a6bbca43d19c6873f82bd
                                                                                                                                                                                                                              • Instruction ID: 4dc84ef6692041bc402cc73b8cf8e0e594c0c1d244bdf3d08337432e82f0d014
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4ee5267a5176d9a11cc91f101b3420e9c6910ef1d79a6bbca43d19c6873f82bd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5D11E330F141158BCB14EA6A84547EEBBEBEFCD660F250469D102E7394DEB58D018BA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: dd80e33794c67bff9640cacb200945c5c453cef13fc68f62f12b2d4859636ca3
                                                                                                                                                                                                                              • Instruction ID: e6377bebedc5e09239a7363efeb7fd37ce068885c975a8aaa6ffc93cb1a85b22
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: dd80e33794c67bff9640cacb200945c5c453cef13fc68f62f12b2d4859636ca3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 120128327082804FD703577884B46AEBFF19F87664B0A48EAC4C8CF173EA18D806C382
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 2686beb05630d625a08a92d31f3d9ec6180b5479ab2be6f9a07a7490fc667c49
                                                                                                                                                                                                                              • Instruction ID: 50e583e65187de79c2bad685fea40b8bbd0d8b801d0f17121e9ca33464262a38
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2686beb05630d625a08a92d31f3d9ec6180b5479ab2be6f9a07a7490fc667c49
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E4118E31714511CFDB158F28E49882EBBF6FB8972531105A9F606CB361EB32DD41DB51
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: cc5ba937f898c18587c2d97848f0fc710cc4168ea45b7c5c0175c7f47d8cd562
                                                                                                                                                                                                                              • Instruction ID: 29ecf0d1c619e057dc7737445aff4d0557b9fdf5cddfd790a2271653e3f314b0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cc5ba937f898c18587c2d97848f0fc710cc4168ea45b7c5c0175c7f47d8cd562
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BB21DB74E0020A9FCB04DFA8D5919AEBBF1FF48350F504599E546AB364DB30AA41CB92
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: a0452b08aa2c2c6caf40b1f8a99c9c56302265633d88a1428f425505368c20f9
                                                                                                                                                                                                                              • Instruction ID: e5ce11ae6118aa034261d5cd5a0d025136717a4beac8c8d7f355720cf86ee570
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a0452b08aa2c2c6caf40b1f8a99c9c56302265633d88a1428f425505368c20f9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A7012D3B7042095BDB114E65E880BABF797EFC43A0F198536FA058A150D732C4A1E760
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3f724ec8831f12e6dbd47e19e320592168a868e1fe1d7a58a27bafac743b0dcb
                                                                                                                                                                                                                              • Instruction ID: 87c2399fe2241de880d94bda50066061282f9e63a8c2d38d7e79e1246840acb4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f724ec8831f12e6dbd47e19e320592168a868e1fe1d7a58a27bafac743b0dcb
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9E01F7337081158BDB109E19F8809BEFFAAFBD5339725803BEA49CB341C932C8019750
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3302126104.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_12dd000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                                                                                                                                                              • Instruction ID: 8eb1aef90e3619e73bc32b139106c5e30a8923c202b29996631afbf3398b67d2
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1311D075504684CFDB02CF58D5C4B15BF71FB44314F24C6A9DA494B696C33AD44ACF61
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: b0d1ab02ae3f4fe30caecccb1348766c44111246e3145aa4045ce935f411f3b2
                                                                                                                                                                                                                              • Instruction ID: 936c577a0904f1e6463404f7be236d26c7e532ef9c7acc0c6c9f0b3be3749916
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b0d1ab02ae3f4fe30caecccb1348766c44111246e3145aa4045ce935f411f3b2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 15016D31704511CFDB148F2CE498C2EBBE6FB897253510569E616CB360DB32ED019B91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 2614c89f7ab3b133e99baaad548af6fe0b63fa64177e5cda923bfdea9079f0da
                                                                                                                                                                                                                              • Instruction ID: 0a95f51624d72fcdc7567d1c5e4041cc863a3bc3787138a433dfb4d25115899b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2614c89f7ab3b133e99baaad548af6fe0b63fa64177e5cda923bfdea9079f0da
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: C711C432D0160ADFCB06DFA8D9904CCFBB1EF9A320F250626D011B7160E7702A8BCB50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: a5838133674d1b90f64c8f995b4e63a0ecb53dbc321d5e785cfad9e27381133f
                                                                                                                                                                                                                              • Instruction ID: 5443c8b476ae00d72694b9e9306673505b71c59181e308295559de70426dcad8
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a5838133674d1b90f64c8f995b4e63a0ecb53dbc321d5e785cfad9e27381133f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5501A43A74012687DB1465AAF400BAAF38BDBCC6F5B044476EA0DCB641EA25C842E7A0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: f08f097d498cb30a7fa1145ffaf156c9071de4e3eb73c5eae72edc9d0ce7343c
                                                                                                                                                                                                                              • Instruction ID: eb1e733e9f4d52f53315de4439dadf37068e8940c90512be86e7292d5ae4069f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f08f097d498cb30a7fa1145ffaf156c9071de4e3eb73c5eae72edc9d0ce7343c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 91115E32E0060A9BCF16DFA9D8544CDFBB2FFC9310F164656D011B7254D7B0254ACBA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: a290ac0e286948cd99287a88820d56cbd1e353860de50ee118e2305bf25e7582
                                                                                                                                                                                                                              • Instruction ID: 2910402f9e54dac5975dfaa724e6587dcf630d17bb5e61d59f995abcf4b88a32
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a290ac0e286948cd99287a88820d56cbd1e353860de50ee118e2305bf25e7582
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5E115E71B001059FCB04EF6AC4A5AAEBBF6EF8C760F104069D506EB3A4DE715D058BA4
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3f6245bf491f5928383564d4bc385ea62b182b3234c8254de31668136803a944
                                                                                                                                                                                                                              • Instruction ID: 79d3712614755135379fe25f03228d3d07aa568fffe20224f92d7360fc92291c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f6245bf491f5928383564d4bc385ea62b182b3234c8254de31668136803a944
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F9018031E0921ADFCB10DFA4E84069EFBF1FF49320B11856AC56AAB611D335A946CF91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c89ed040f64c0de16e3a8054c6d0a0929eb6718b72f0b1831a116d1f6dcd5205
                                                                                                                                                                                                                              • Instruction ID: d6e809ed9ed937f5222922f3200a64a7595fb31fd324d524a63b31d4f2e87501
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c89ed040f64c0de16e3a8054c6d0a0929eb6718b72f0b1831a116d1f6dcd5205
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E7F0FC72A092805FD706DBB84CA05E77FF9DF5715071584EBD044DB252EA306906C7A0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 19412e1a5469a6866fa424e52494b83b31014674009bc46fb01f54fdf403a4b1
                                                                                                                                                                                                                              • Instruction ID: 20ce90c021c0852f7d8d7fcfeb00b1937d97f3a69021f774eec7a4c2652853f7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 19412e1a5469a6866fa424e52494b83b31014674009bc46fb01f54fdf403a4b1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F201F5347116129FC7269B64D840812FBB5FF8976131D82F6D8998B326CB32EC42CBE1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: f31b6455244ed6ea5688c453da7a6204af93c524b2526659483948bed84c1d50
                                                                                                                                                                                                                              • Instruction ID: 385f1b04b667f8d3661fa0f4113a88193e38f6976a8d432b843719d01a601139
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f31b6455244ed6ea5688c453da7a6204af93c524b2526659483948bed84c1d50
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AF019E3592421A9FCF118A69CC449DABBB1FF95320F1A4267E504EB250E7715926DB80
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 37d11644c86164c629e0b35a6af2e04fd0a200d284bd4b1d9605232e3da07500
                                                                                                                                                                                                                              • Instruction ID: 2686c6e467b61ef7024b9e225b1e748348e8b2d14189b8ebe0e5b44140c091e5
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 37d11644c86164c629e0b35a6af2e04fd0a200d284bd4b1d9605232e3da07500
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F501F235608220EFDB258A16C8909B7FBBAFFC5721715841EE68286940C671AC42E7E1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e1a63fea97b1b1afbaa4ceb7ab3f6638a4d264542dda818261f298052a3d4080
                                                                                                                                                                                                                              • Instruction ID: ad2f6fba667e760281cefe999703d1e953b70d423a0574e81c9f72d6b709482b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e1a63fea97b1b1afbaa4ceb7ab3f6638a4d264542dda818261f298052a3d4080
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1C017132D1060E9BCB05DFA9D9804CDFBB6EFD9320F654626E501B7260EB703A4ACB50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 9828fe9195766d46ba4c600037f9ab3aa6486ff11c0583277bda089624893be2
                                                                                                                                                                                                                              • Instruction ID: 70305ffe5f6210dd7bfba745a7dc1d395dab49e16129bfd0b12fe18f24ec112b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9828fe9195766d46ba4c600037f9ab3aa6486ff11c0583277bda089624893be2
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BF01D6313187814FD7069B3DE86199A7FE9DF8725070944EAD080CF266DA25D809C796
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3b17219308ef580b7024b89493f03031cd1b7caf77b23291b7585bd9f7304ce7
                                                                                                                                                                                                                              • Instruction ID: 019c56d29019ff32245e0ad6d60359fffc5f86214c8b256a69b81154c53c689a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3b17219308ef580b7024b89493f03031cd1b7caf77b23291b7585bd9f7304ce7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A4017C32E0061AD7CF059FA9D8904CDFBB6EFC9320F114626E11173254EBB0258A8BA1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 39a3b87879016996de5bc90d73aa45c41173321e2a468ba058dad2c7dea1ebbb
                                                                                                                                                                                                                              • Instruction ID: a64007933432f9d155a60f74d135504246c4f893545e9009f600eb6cdece7d6b
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 39a3b87879016996de5bc90d73aa45c41173321e2a468ba058dad2c7dea1ebbb
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E701F9353002129FC3399669E800856F7AAEFC427631886B9E94D87704CB35EC03C7D0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 864e31f23aa88b2cff3133339ee773074d4e2df19ee47dfc1c8782b6294c094b
                                                                                                                                                                                                                              • Instruction ID: cd1e5b79afa8b61db0e80c67248de85253c150cf50118dcfa0c6d9a0eede40c4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 864e31f23aa88b2cff3133339ee773074d4e2df19ee47dfc1c8782b6294c094b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9501F9367002118BC705EB55E8607AEB367FFC47A0F54861AC5556B348EFB4AC0B87D1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 574e1dc26ae0d3ce70fa388c001b341959fb09b28ee6d41882369b704329ea07
                                                                                                                                                                                                                              • Instruction ID: c9d9e7fcbc4cd96ad2e0d201aad079a715075219077020b612c614ebd0d1f85a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 574e1dc26ae0d3ce70fa388c001b341959fb09b28ee6d41882369b704329ea07
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 57F0E933B081604F870196AE7C954EEFBB5FFCA2B13050167D215E7301C9214C1AC361
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e3b679c997bb7adc122c8bbeb2eede0cfd6a5e0a57d869c2eb3d9c4d3e5cb5a9
                                                                                                                                                                                                                              • Instruction ID: 9fa99c71ea7ac531eaffbeba6bc30dedb8d215d651f2015227c1691e45397257
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e3b679c997bb7adc122c8bbeb2eede0cfd6a5e0a57d869c2eb3d9c4d3e5cb5a9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 77F02D377002114BC705E6549C203AEB367FFC46A0F548529C5156B344EFB0AC0747E0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 48ff190f56ae0883ccefeaa5d24e176a7a5efbf9c23f3160a3a6c5ba9a051dea
                                                                                                                                                                                                                              • Instruction ID: 3a21c2a78c24dc02bb4c87493fd1d162e2e1c20a5cd7579fd754a24daa66e4bc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 48ff190f56ae0883ccefeaa5d24e176a7a5efbf9c23f3160a3a6c5ba9a051dea
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B5F0C232D501099BDF25DAA4C45A9FEBFB26B88350F04852AC013B7244DEB45507DA85
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 609ec6c04d8a7bca27bff0cebf0976ab0aff89bce705d9c6ead241212ee9436c
                                                                                                                                                                                                                              • Instruction ID: af42ac0616c2010c22b6f50725ce3d18522772a932975bd339c2fcf5fc473ad3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 609ec6c04d8a7bca27bff0cebf0976ab0aff89bce705d9c6ead241212ee9436c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 34F0B4217046154F8B084B6EA8C595BFBEEEFCA674350806BE409CB365EF60DC068361
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: bc3475f4f71ce4690bd86f5aac30ea2c3fda91f19842ff50ddc58e0ed4325d56
                                                                                                                                                                                                                              • Instruction ID: 8dcd7c971aa5fdc644ff257bc9cbaf7ccf7c3b4ce55e947b7b29fa9aa1ca6313
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bc3475f4f71ce4690bd86f5aac30ea2c3fda91f19842ff50ddc58e0ed4325d56
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 99F0BD393005109FC704DF1AD898C5ABBE6FF8972135680A9EA0ACB371DA61EC42CB94
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 2f9ed989047092ca260236b464f37375e295df9de762082d5a8e9ad6bc72552c
                                                                                                                                                                                                                              • Instruction ID: 906c6f50fce8aa97e31b669a61923d49ea48d72d08ae4b6776e0d3336a7c6401
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2f9ed989047092ca260236b464f37375e295df9de762082d5a8e9ad6bc72552c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BBF0C231604625AFD7244F46D844EB7FBFAFFC4725B00842DE68742A40C675EC42D7A0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 15705aba106bc1f62d441e54d2347e785a66ebe0a1cf6af533c480c238fbf178
                                                                                                                                                                                                                              • Instruction ID: 89966dbe630272c355bc6ed152996d0df0414f12cd6b3e66c4ab52780011c29f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 15705aba106bc1f62d441e54d2347e785a66ebe0a1cf6af533c480c238fbf178
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D6F0C832A0114A9BDF16DB74C4A59EFFFB15F85350F044469C412AB241CE74150ACB81
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 69a16ae24326c0fe5b7ffb139164f728ca8b224735bc0fbb1e957246025e85ed
                                                                                                                                                                                                                              • Instruction ID: 1e206c8fc17a856677686e18a39921db13b2093fa0885cc334f65cce529c9eff
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 69a16ae24326c0fe5b7ffb139164f728ca8b224735bc0fbb1e957246025e85ed
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E0F0F42080D284DFC701CBB8A8618A9FFB4EE473A071505DEC084DB227E6348A05EB15
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ddd1ccdd50a0f2df87bdab1110e05a2a13e81570fd7cd269fb4b7f3725f4b719
                                                                                                                                                                                                                              • Instruction ID: fede68d1e7d17f69a3d100452e03677a2a36c30f5142ab3cf1c775fe9a399b8c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ddd1ccdd50a0f2df87bdab1110e05a2a13e81570fd7cd269fb4b7f3725f4b719
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E7F050312006428BCB05E35CA46095EFBA6FEC57B0311493DD10DCB301DE20D80D8799
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 3f4441d4d6f0ed357eae577c7f18aa430170a9aa81987e8af10fe8b9ad9dcddd
                                                                                                                                                                                                                              • Instruction ID: 486e63f35962fb3b81b955628ceee7c1754cbfa32db5e08801400e7017512364
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f4441d4d6f0ed357eae577c7f18aa430170a9aa81987e8af10fe8b9ad9dcddd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D4011270E00209EFCB44EFA8E551AADF7B6EF84744F1085A98505A7354EA305E09CF81
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 7dcca246c5810514578abaf18bde99f1391756971449b9844dae6f63987ed35a
                                                                                                                                                                                                                              • Instruction ID: 45a7ed05602bc5ecf25cc8c6e83ebdc171cc3502ab1d98b8dd989d5876bdc835
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7dcca246c5810514578abaf18bde99f1391756971449b9844dae6f63987ed35a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F8F0AF31214BA0CFC321CBA9E404A46FBF5EF86719B14486DD0C687A62DBF5A948C792
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e58aec6fd3868db4e957d036dfc6a6678bdc309d6705fed1f9c799ad56e98a42
                                                                                                                                                                                                                              • Instruction ID: 601ec69fd697c4a804019def3c3e13713f566da1aa9aa41feb4eb84399375b8c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e58aec6fd3868db4e957d036dfc6a6678bdc309d6705fed1f9c799ad56e98a42
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B3F030373141545F57109A9EA884DABFBEDEB89231355807AF61CC7211CA21D81197A0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 4a3887ae3bafbaaebfacb7756395dacb9a48144b46fc19f4f0da9b9c3c2129c7
                                                                                                                                                                                                                              • Instruction ID: 3ef16b443601a3cd257004a57136e3e6cc36d65fa63b96ac93b54b26b5cb73a3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4a3887ae3bafbaaebfacb7756395dacb9a48144b46fc19f4f0da9b9c3c2129c7
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: EDF030393092548FC715CB1AD894C56FBF9BF8A720315819AE949CB732C671EC01CF50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ad125dc45d409c3e0fe6c59a4fa42819da504619a31f3cab54364355b1751ae8
                                                                                                                                                                                                                              • Instruction ID: 1f4e0334beea9d420f1a6481eca7d2956784b43dd470848c3d4629c086105d37
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ad125dc45d409c3e0fe6c59a4fa42819da504619a31f3cab54364355b1751ae8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 57F090357012208FCB51EF39E85066937B2EF89670B4082E9D459DB3B9DB309C52CB51
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: ec7292c2f63952cffdeda4abcad5b7d2f1ec00f81b5e2b1acf21c806654b5b08
                                                                                                                                                                                                                              • Instruction ID: 26b9235433528be5f2528951065a1c08c076c2678b542d2ada46c816e0f80b40
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: ec7292c2f63952cffdeda4abcad5b7d2f1ec00f81b5e2b1acf21c806654b5b08
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 11F0A0353042148FC3159649E444AE6F7EAEBC9731F1540AAEA0A87B61CBB1FC01CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 8312c2ffad0b4b51a7599849441f7168ce3c1a256284c37670f97187e9d0ddf9
                                                                                                                                                                                                                              • Instruction ID: e0fe57b1426d37892dbf834dd18e8202bfbc3585c91b2dab7eb9eb86bffee99e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8312c2ffad0b4b51a7599849441f7168ce3c1a256284c37670f97187e9d0ddf9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 99F0D43A3105008FC714DB1EE488C9AFBEAEFD972131580AAEA09CB731CA71EC01CA50
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 1004d90b381589828cd6270dd0cb2362a5d6c353120926fc4511dac9e63bc6c9
                                                                                                                                                                                                                              • Instruction ID: 2d1bdb1c4fffa90def80179916cf77706e01370f64c95665dc0fd9ebe3cb02dc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1004d90b381589828cd6270dd0cb2362a5d6c353120926fc4511dac9e63bc6c9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E1F01430D0021ADFCB14DFA9E9406AEFBF1FF48310B208929C569A7210D335AA42CFD0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: cc765469e7b4c62433d4792707f8f326e263c2e066bf7c57c7c2287bdf200289
                                                                                                                                                                                                                              • Instruction ID: 146876f9f2769b403e3c8d8015e36319cc868cd7247c2935fc627c266c77890e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cc765469e7b4c62433d4792707f8f326e263c2e066bf7c57c7c2287bdf200289
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9DE09232608650DBCB118A1AEC80D5BBFBDEE8B7707628277E508C7251C631D90097A0
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 200888c7309d16c514c5a59bc2dc71a1863298c181b2636d71811520890504cb
                                                                                                                                                                                                                              • Instruction ID: 5e75b6b4f8220860e6d88912ec96ab6b65298678c06bc1082e4014d1882216e4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 200888c7309d16c514c5a59bc2dc71a1863298c181b2636d71811520890504cb
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7FE0D83262D2814FE741C61DEC85650FBE4DB456F8B2C05FAC0D6CB043D921E496CB41
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6c4155fe773a18dc873b89d547868b1752a02a882a0470f271e6c17459173ddb
                                                                                                                                                                                                                              • Instruction ID: 12b86378239d86bacf29ea8065b4afd15d4e3ecc296dc891cfe2efc4b406f42a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c4155fe773a18dc873b89d547868b1752a02a882a0470f271e6c17459173ddb
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: CAE026617095608FCB25A32688207C2BF66DFCB61071A40CBC242CB296CA720D09C3E1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 7c34f89ac4535388e4fafd6d011293652cf08ec434a86d3958267bbfb9d392da
                                                                                                                                                                                                                              • Instruction ID: e5f879713225828ebae641656d891eecb4b804e6623e4764a650a91510d36c8f
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7c34f89ac4535388e4fafd6d011293652cf08ec434a86d3958267bbfb9d392da
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 46E0D8223095A0DF8716539C642487ABFEACECBB6031900EED145CB343CD118C019795
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: d5c5f30716588d932f69da62faf82daec31a7f5b4a45a1f05af95db0f1ad5ec3
                                                                                                                                                                                                                              • Instruction ID: b3ea0f3cdb69f8c030bc87464c70d46e31882dec637c46567f59d3e033e39604
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d5c5f30716588d932f69da62faf82daec31a7f5b4a45a1f05af95db0f1ad5ec3
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E2E0DF2470C7820B972227766C602ABBFE59F877B030508A8C9E6CA215FA18C620A751
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c72b03b30a2c00629876360f24ba24cf381585874e89dbaa28eef84524f0586f
                                                                                                                                                                                                                              • Instruction ID: c86f07a485330c7dbfd49065e790b392c65dad7105d131e2703ced960c288845
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c72b03b30a2c00629876360f24ba24cf381585874e89dbaa28eef84524f0586f
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 72F0F870E08248AFCB45DBA8D46449DBFF4EF45200F0048EAD4859B265EA345A15CB85
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 473d31cd2c17630a04a71a52c71ed3ef745d995b2324742640c0c115802d29c5
                                                                                                                                                                                                                              • Instruction ID: bdffe1da8547d1976834b40cf1a87807518907eea70f1ce1f2fda04487e68368
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 473d31cd2c17630a04a71a52c71ed3ef745d995b2324742640c0c115802d29c5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: AEE09270A10109EFCB00DFB4E981DAEBBF5FB91310B1046A9C409D7240F6308B04D751
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 108ad9dd263c58b042eaa8527f8f578f9c3533cea6b1c46499025bae8cc7a8d6
                                                                                                                                                                                                                              • Instruction ID: 64132e6701dd134959f02433f8b93d1a503503b49e8ad86fa39faa61b13de38d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 108ad9dd263c58b042eaa8527f8f578f9c3533cea6b1c46499025bae8cc7a8d6
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: BEE06D70909249DFCB01DFA4E95299EBBB5EB46310B2046AAC408DB202E6315A05AB45
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6b4d082f6e84914bf663b40ed19964240385c47a03a95ca795ed4620258b77b5
                                                                                                                                                                                                                              • Instruction ID: 72133db0df668057d443bc0969d6ab8e1d277112a60fdc987ad316f145a1bccf
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6b4d082f6e84914bf663b40ed19964240385c47a03a95ca795ed4620258b77b5
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1DF0E534909258EFC701EFB1FC5099D7FB4FB06300B1142AED80487355DA314E04DB46
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 8d91b872cae0fc769947882fac352688fc29a12980178e4b37eb71ecf0c3b154
                                                                                                                                                                                                                              • Instruction ID: 8a40e7ae53d1565500631be6e9a02c88dd68eccb0ecf6ee1f0e5041e836826b3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8d91b872cae0fc769947882fac352688fc29a12980178e4b37eb71ecf0c3b154
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 94E017346442248FCB04EB98D4949A53FB9EF4A724B1100E6E604CF672DEA6EC428BA5
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 44b9bd529f42d84a12dd260d1754f88b10f07f8f4253a8f53c94d0d397e5a5b4
                                                                                                                                                                                                                              • Instruction ID: 325399256f919acb2cd1a777d8427201ec1aee91c6b2a6185b5a79e01f3c06c0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 44b9bd529f42d84a12dd260d1754f88b10f07f8f4253a8f53c94d0d397e5a5b4
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: ADE08C36545901CFCB009F58C888AA077F1AF4671671900E0E6048F972DA3AE852EB60
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c5341b9e7826623a4773119cff55284320e6c55e3432fd74de9be0c15458c3dd
                                                                                                                                                                                                                              • Instruction ID: 0aa8f3281ab995a720b2ff6719eee7488ef8144966e449da0e8bab411a2c86ca
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c5341b9e7826623a4773119cff55284320e6c55e3432fd74de9be0c15458c3dd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 47D05226304520270208719F388486FEACEEACD8F1358403AE20DD3300EC218C0682E6
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c1bd05e286a8bcc61ac32103b13787bb50ca089a3f3b41a159b18a7e461262f8
                                                                                                                                                                                                                              • Instruction ID: 9045e1afda43bcacdc9d2969f704b63a62f327a15ae788a4fa839d8f266b7b41
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c1bd05e286a8bcc61ac32103b13787bb50ca089a3f3b41a159b18a7e461262f8
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 30E012357401109BC7186A6AE80DE6A7FE9EBC9B25F15016AF909CB391DEB1EC028794
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6dc6a48d98d551aec223d16cd3c8ab91ab4a77f8136cccf358aee4b89ac5cb2e
                                                                                                                                                                                                                              • Instruction ID: ce95ac8c8c37577f9c801a732f8eb2ffe553afd747db98e729e98f4a1c3bc08d
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6dc6a48d98d551aec223d16cd3c8ab91ab4a77f8136cccf358aee4b89ac5cb2e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: A2E04F31609251CFC342CB29E854682FFB5FF8A36131A46DAE049DB219C770D84AC791
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 995c48f34299f275b120fea20bfbdf9e56c87a7857bb18a2b7a535fd885e5c5c
                                                                                                                                                                                                                              • Instruction ID: 3a412a80a8d9a330c7816169dd00daac748a9e4059cbf8eae8bf3c1024f96096
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 995c48f34299f275b120fea20bfbdf9e56c87a7857bb18a2b7a535fd885e5c5c
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E9E0C2293093A41BC7063BED286487FBF6ECAC757431880A7D560CB346CDA58D01AFB1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: f6bb4767fca2781fb5edc9276ab31c58bb2758a3ba6ceefc176ab820659ab243
                                                                                                                                                                                                                              • Instruction ID: 247eaefd9dbf73ac7b794bad5517f41971d6cd490d2f7de0ec6bc43e3f0d69b1
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f6bb4767fca2781fb5edc9276ab31c58bb2758a3ba6ceefc176ab820659ab243
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 29E092309046089FC705DFA4F9409ACBBB9EB45200B0041EED804E7251EA355E04E751
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 05ac80c17a84b07d0325e0538d2ff0b11d0f5b3da0669bb8fb9f9925e86c3d95
                                                                                                                                                                                                                              • Instruction ID: 6f8882804334860cce05daff524d96b5266cdf14ba0261f18b661108e32598a3
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 05ac80c17a84b07d0325e0538d2ff0b11d0f5b3da0669bb8fb9f9925e86c3d95
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 40D05E36300520D70518629D740486EF6DEDAC5BB1315002EE60AC3341DE519C010B95
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: aa736e2a75fa568c569f6b209bce13dcb2291f2c0a022213602ecda691d1de20
                                                                                                                                                                                                                              • Instruction ID: 27b883d6a6ead23f6efc809838e496bb2aba6ee21cb92c3207f64d311402c266
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: aa736e2a75fa568c569f6b209bce13dcb2291f2c0a022213602ecda691d1de20
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 61E04F302092808FDB4A9778A4B057ABFE4DF8A62031448AAD486CB252DA2198129B15
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e2db1b3cac87752773f7b6cfed973e69b09d31da03749ce3f6543bd0979d7ae1
                                                                                                                                                                                                                              • Instruction ID: 281a2b84895a9fd1107d02d452ae97094a03c68147f5a07c91f6cb39f1f1d4e7
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e2db1b3cac87752773f7b6cfed973e69b09d31da03749ce3f6543bd0979d7ae1
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: F1E01271D01119EF9B80DBB9A8016EEBBF4AB08310F1141A6C449E3202E2304A00CB90
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e39e9a05cdb223f61023302a12d4e0e91ced7d9a76c82aede170ef5cf0fb2a52
                                                                                                                                                                                                                              • Instruction ID: 97b50bd003cf7137572ed605294faa5e2f1538e062e093bd96d894170502a4a0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e39e9a05cdb223f61023302a12d4e0e91ced7d9a76c82aede170ef5cf0fb2a52
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23E0C238B083824F97021B7260242953FF16F8725034840A0C805DB20BEA20C802D391
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e89eaf253f52dcb818d7d1094a195b449901e39fd274fc9d9983ca7aabca6b06
                                                                                                                                                                                                                              • Instruction ID: ea27248d24cba7cecf6f8d575a5ea33542c53b253f3392d3db47ee601e458b05
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e89eaf253f52dcb818d7d1094a195b449901e39fd274fc9d9983ca7aabca6b06
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B8E04F34A11119EFC700EFA5F94489DBBB9FB49300B108269D80493314DA315F14DB55
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: b824167694f8c6b722733314f02df9aa4e6286eee1c020a503f59751a728484a
                                                                                                                                                                                                                              • Instruction ID: 5224df5afcdd272386e5659018f62342cf31b9b34abb8c6c08f6f2749c7de32c
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: b824167694f8c6b722733314f02df9aa4e6286eee1c020a503f59751a728484a
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D6D09E34B087075B57146A7AAC4072AB2D9AB897E43544560DA65D7304FA28DA016760
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 5bbad197fc9ba875648d6d86b769886e3433a2a977d6b574430300fa0eb62692
                                                                                                                                                                                                                              • Instruction ID: 94bf25f026abbbf0dab116c0252a248c5e12ca600a332bffc33e6a90f9b4fdb4
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5bbad197fc9ba875648d6d86b769886e3433a2a977d6b574430300fa0eb62692
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B3E09270E0430CAFCB44EFA9E54599DFBF9EB48300F0085A9D809A7354EA349A098F81
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 2320653987fd72931e814069aee1e75772f2aa576a1c2242f437fc81df7b537b
                                                                                                                                                                                                                              • Instruction ID: bcff5a8dc7952d27b91aa78cb6ebad951e33411b63c5debb8732a8b89c720f15
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2320653987fd72931e814069aee1e75772f2aa576a1c2242f437fc81df7b537b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4DE0ECB5D05219DF8B40EFB8A9451DEBFF4EF49660F2005A9D999E7211E7308620CBD2
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 03689a14f4543045fbd419357b5a1939b3154838162368e7a43219ef0ac05703
                                                                                                                                                                                                                              • Instruction ID: d405efe5588adce816522f8e2bebc2a200dcd0844614e72aec1713d19fa07820
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 03689a14f4543045fbd419357b5a1939b3154838162368e7a43219ef0ac05703
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3AD05E36B401069FC7109A59EC80EAAFBEDEF88225B4480A3F128C7262DA35E9119730
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 45bcc194ce0b6337db064ce929f01276155993b4963b0f819a3f104a0182ea11
                                                                                                                                                                                                                              • Instruction ID: 87e19e32665b95b7de40c2ec1f0f7a318956aa245713661a577b67c7b3ea2aad
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 45bcc194ce0b6337db064ce929f01276155993b4963b0f819a3f104a0182ea11
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00D0E2B1D00219EF8B84EBA9A9056DEFBF8AB08220F000076D51DE3201E2308B108BD1
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: d06f5c6e0f7d08e064964975b7402a5441d07dc4476642d5f444add573f38e45
                                                                                                                                                                                                                              • Instruction ID: 3d6b72bbbe66ec07f4096574e6f9dd842d4200eda1c70acff6bd8f73cd094b5e
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d06f5c6e0f7d08e064964975b7402a5441d07dc4476642d5f444add573f38e45
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4ED01270A10109EFCB04DFA4E941D5DBBF9FB45200B1045A9D509D3310FA315F049751
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: cb8f8b662f8c161022ae97b6d2f7c7484033abe031c49e3669966472949af0a9
                                                                                                                                                                                                                              • Instruction ID: c8f75a1fed3aaa7a5ba01490b1e565599d4bdd5420b06590b9e8d0c67d739534
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cb8f8b662f8c161022ae97b6d2f7c7484033abe031c49e3669966472949af0a9
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E1D0A731604540CFCF025B54E848809FFF1EFC931131504E7D045CB272CA72E811DB51
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: d7868365f4ee5d5f41a9ff08dc2c84b34190b152971777d4c8806c5077883414
                                                                                                                                                                                                                              • Instruction ID: c69a61f821dcecae36d3d74dad092543befece403f12c93a6a92147043d7a429
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: d7868365f4ee5d5f41a9ff08dc2c84b34190b152971777d4c8806c5077883414
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 36D01730A01209EFCB00EFA8F90199EB7F9EB44310B2086AD9409E7301EA316F049F91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: fc52aa060085db6791c925894a9d27e92f7511ceea5b06b57ad78ce567b2e10d
                                                                                                                                                                                                                              • Instruction ID: 5c7c2a536fde87f38aff9e3cb45be1baa4924250ccdd554d361a17a3a9704631
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: fc52aa060085db6791c925894a9d27e92f7511ceea5b06b57ad78ce567b2e10d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: B8E01234245284DFD71A5F74D464954BFB4AF4A72430508D5E489CB373CB31D810DB12
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 72b2b48bf4f01cd9dbc560ec4b7a51d04a0b641746582ac9772ee1f5a8e187dd
                                                                                                                                                                                                                              • Instruction ID: e243bb5a2feb887a1bac81d5c29ebc1bcd8656f43419d4ece2e1af059e7102dc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 72b2b48bf4f01cd9dbc560ec4b7a51d04a0b641746582ac9772ee1f5a8e187dd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8FD0123090110CEFCB00EFA4F94059DB7B9EB44210B1046ADD508E7300EB315F049B51
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: cc40ec44fca32fd2b8d962ae9eac89de32684d12dbe567eb9d912afbe411dc80
                                                                                                                                                                                                                              • Instruction ID: 21df5bf8de5d14040ededebbf1645eaec432c2b440e9d09263ccc106f791eaeb
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: cc40ec44fca32fd2b8d962ae9eac89de32684d12dbe567eb9d912afbe411dc80
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8ED0C933B041259F8B045F9AF8044BDB7F9FB88626721486FF51AD2791DB7585458B80
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: c89aaca75dccf0ac946c5c1c2139760b69fa3e3220080ed8d966a5357b946305
                                                                                                                                                                                                                              • Instruction ID: cb4625937c42462db2cee689b4b2bf6884c0cbc977556d60a8403b1fa4e0fafa
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: c89aaca75dccf0ac946c5c1c2139760b69fa3e3220080ed8d966a5357b946305
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: E9E0123890020ECBDB14DF91D45466EF771BF44758F208819D412AB244EB759547CF91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6c19898e5b154d70067316f3896878326d695b2dbe4b9ca06d3c4f1d5a5f4d4d
                                                                                                                                                                                                                              • Instruction ID: 50fcf5f9f316c00549b16f614eb6e607b2af9cecc7e8e98bfe12224fb7d6e755
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c19898e5b154d70067316f3896878326d695b2dbe4b9ca06d3c4f1d5a5f4d4d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 90D0A73064D3C89FD7218BA488B08667FB8CE0721075608CED9858F233C8229410D341
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: a8e110abbd8f7cc28be690ad5cb7eb2ce9f6900598be15ea2ccb5d0957262dcd
                                                                                                                                                                                                                              • Instruction ID: b728cfe00e42922a3d68a73d248c330edc5a33718c3f8715b86acb2b1ef9cc9a
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: a8e110abbd8f7cc28be690ad5cb7eb2ce9f6900598be15ea2ccb5d0957262dcd
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D7D0C935280509CFD7089FA4E448D25FBF8AF89B2534004A4E40DC7331DB31EC10EA55
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 702d35408e155d4e328f3c9490cdd2b2911e8d4258c65b26453075cc1a83714d
                                                                                                                                                                                                                              • Instruction ID: 43c0ed08e36ae70a02232d0b252ef7b0e4c6527e6802c2ddd2c393d9e25f0c73
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 702d35408e155d4e328f3c9490cdd2b2911e8d4258c65b26453075cc1a83714d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: D1D05E79704019CFCB04DF95E040AEDF7B2FB88726F2041A9E6196B754D730AE15CB91
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: e0e811a279fe8ae5684a7ac1915c29fc62e92abb23e0ef0a8536fe9a2332b37d
                                                                                                                                                                                                                              • Instruction ID: 7b2085e62cf76747fad1be9c2f078284f7f90304a2fc79a104f2e5f9fc1420be
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: e0e811a279fe8ae5684a7ac1915c29fc62e92abb23e0ef0a8536fe9a2332b37d
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 80C080313402244FC708A65CD410D6937DDDF49724B0100A6F509CB371CD92EC4147D5
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3349809863.000000000BD60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BD60000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bd60000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 6d8d39f26eece20c3f566be1ff02409839c600506513f30e3a20b94065d4e57b
                                                                                                                                                                                                                              • Instruction ID: 3e855a54beb9ade6697db8095504d7f586a42cc34d2a2b96a36f44ea59eb2916
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6d8d39f26eece20c3f566be1ff02409839c600506513f30e3a20b94065d4e57b
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2CD01238B4470A5B57046777740421A73EA7BC62947944120DD08E2309FF34DD028590
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: 200ab1ff26a44c684e22f076b179de13ef433e0d7935b5d8a0753a5a3d210369
                                                                                                                                                                                                                              • Instruction ID: 2d714e57377d2e69d92233cf7175ec4ebaeca491f529007112ceb7155fe0e313
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: 200ab1ff26a44c684e22f076b179de13ef433e0d7935b5d8a0753a5a3d210369
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 46D01236145906CFC7009E19D845AB473E5AB4071AB5D40F4E3088F972D326DD91E650
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: bc3136a8b08b2e1bb10d6732676ec70cd3533cc67b9cbbbf3129ad986771ae9e
                                                                                                                                                                                                                              • Instruction ID: ef874623ebf05c29eb0304b12d8526e978dbc27e0c0e33d31d043fae0b035cbc
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: bc3136a8b08b2e1bb10d6732676ec70cd3533cc67b9cbbbf3129ad986771ae9e
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09C09B7452D580DFEF816670D5747C77A54DB523C5F2004D2C111C5557C16A8585D635
                                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                                              • Source File: 00000022.00000002.3350571102.000000000BDF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDF0000, based on PE: false
                                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                                              • Snapshot File: hcaresult_34_2_bdf0000_FastestVPN.jbxd
                                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                                              • Opcode ID: f7fa15f7c548b749c48086f68aa33cda2e259a937700cae4efc8e1463ca47e96
                                                                                                                                                                                                                              • Instruction ID: dd50615a6dd8f3d56f56ef5282829c3c0b9ae69fc0b9ecc1234ea5f0851f34c0
                                                                                                                                                                                                                              • Opcode Fuzzy Hash: f7fa15f7c548b749c48086f68aa33cda2e259a937700cae4efc8e1463ca47e96
                                                                                                                                                                                                                              • Instruction Fuzzy Hash: